Sie sind auf Seite 1von 202

EtherNet/IPt

Design and
Configuration

Instructor Guide
Important User Information
This documentation, whether, illustrative, printed, “online” or electronic (hereinafter “Documentation”) is intended for
use only as a learning aid when using Rockwell Automation approved demonstration hardware, software and firmware.
The Documentation should only be used as a learning tool by qualified professionals.

The variety of uses for the hardware, software and firmware (hereinafter “Products”) described in this Documentation,
mandates that those responsible for the application and use of those Products must satisfy themselves that all necessary
steps have been taken to ensure that each application and actual use meets all performance and safety requirements,
including any applicable laws, regulations, codes and standards in addition to any applicable technical documents.

In no event will Rockwell Automation, Inc., or any of its affiliate or subsidiary companies (hereinafter “Rockwell
Automation”) be responsible or liable for any indirect or consequential damages resulting from the use or application of
the Products described in this Documentation. Rockwell Automation does not assume responsibility or liability for
damages of any kind based on the alleged use of, or reliance on, this Documentation.

No patent liability is assumed by Rockwell Automation with respect to use of information, circuits, equipment, or
software described in the Documentation.

Except as specifically agreed in writing as part of a maintenance or support contract, equipment users are responsible for:

• properly using, calibrating, operating, monitoring and maintaining all Products consistent with all Rockwell
Automation or third--party provided instructions, warnings, recommendations and documentation;
• ensuring that only properly trained personnel use, operate and maintain the Products at all times;
• staying informed of all Product updates and alerts and implementing all updates and fixes; and
• all other factors affecting the Products that are outside of the direct control of Rockwell Automation.
Reproduction of the contents of the Documentation, in whole or in part, without written permission of Rockwell
Automation is prohibited.

Throughout this manual we use the following notes to make you aware of safety considerations:

Identifies information about practices or circumstances


that can cause an explosion in a hazardous environment,
which may lead to personal injury or death, property
damage, or economic loss.

Identifies information that is critical for successful


application and understanding of the product.

Identifies information about practices or circumstances


that can lead to personal injury or death, property
damage, or economic loss. Attentions help you:
•identify a hazard
•avoid a hazard
•recognize the consequence
Important User Information

Labels may be located on or inside the drive to alert


people that dangerous voltage may be present.

Labels may be located on or inside the drive to alert


people that surfaces may be dangerous temperatures.
Summary of Changes

Overview of Changes from This course has been updated to reflect all feedback. Please note the
Last Major Update following major changes:
• All feedback from the FTI Feedback database as been addressed.
-- Additional information on managed switches was added.
-- Additional information on the types of cabling and connectors
was added.
-- Additional information on environment classes was added.
-- Additional information on wiring schemes was added.
-- Duplicate basic IP address information was removed from the
three Configuring and Modifying IP Addresses lessons and
added to a new lesson entitled Pinging a Module’s EtherNet/IP
Address.
• The Excel spreadsheet for the Optimizing an EtherNet/IP
Network lesson was corrected. The applications for exercises C
and D were simplified.
• The Communicating between Multiple Controllers on an
EtherNet/IP Network Using a Message Instruction exercise was
updated to reflect the data exchange between the ControlLogix
and CompactLogix controllers.
• The lesson Configuring the 9300--8EDM Ethernet Diagnostic
Module was added.
• To allow for faster and more timely updates, various manual
components have been consolidated, removed, or changed:
-- Software version numbers have been removed from instructor
and student project file names (e.g., PMV_1756r_A1_13). The
software version will be indicated at the folder level instead of
in each individual file name.
-- The cover sheet has been removed. This information is
maintained by our print vendor.
-- The agenda has been moved to the Course Overview.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
b Summary of Changes

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
Comment Form

Email: ratps@ra.rockwell.com
or Fax: 440.646.4425

Page 1 of
Date:

Contact Information:
Name:
Company and Location:
Phone: Email:

Comments (include lesson title, if applicable):

Course or Product Name (Important):


Page 2
Table of Contents

Introduction

Course Overview
Course Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I
Who Should Attend . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I
Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . II
Meeting Course Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . II
Student Materials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . II

Lessons

Designing an EtherNet/IP Cable System


What You Will Learn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--1
Why These Skills Are Important . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--1
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--1
EtherNet/IP Network Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--1
Environment Class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--2
EtherNet/IP Network Hardware Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--3
Switch Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--5
Cable System Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--7
Copper Cabling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--8
Two--Pair Cabling vs Four--Pair Cabling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--9
Fiber Optic Cabling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--9
Connectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--10
EtherNet/IP Network Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--11
Wiring Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--12
Grounding and Bonding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--14
Network and Operational Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--16

Exercise: Designing an EtherNet/IP Cable System


Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--19
How Did You Do? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--21
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--22
Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1--22

Optimizing an EtherNet/IP Network


What You Will Learn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--1
Why These Skills Are Important . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--1
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--1
EtherNet/IP Network Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--1
ii Table of Contents

Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--1


CIP Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--2
CIP vs TCP Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--2
Types of CIP Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--3
Multicast Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--3
Example: Multicast Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--4
Counting CIP Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--4
Determining System Bandwidth Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--6
Predicting Maximum Input or Output Times for CIP Connections . . . . . . . . . . . . . . . . . . . . . . . . . 2--7
System Delays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--7
HMI Nominal System Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--8
Alternative Modules and Connection Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--9
Here’s How . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--9
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--10
Determining the Total Number of CIP Connections for an EtherNet/IP Network . . . . . . . . . . . . . . . 2--10
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--11
Determining System Bandwidth Requirements and CIP Connections for an EtherNet/IP Network . . 2--11
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--15
Determining HMI Nominal System Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--15

Exercise: Optimizing an EtherNet/IP Network


Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--17
How Did You Do? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--19
Exercise B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--19
How Did You Do? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--22
Exercise C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--22
How Did You Do? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--27
Exercise D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--27
How Did You Do? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--29
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--30
Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--30
Exercise B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--32
Exercise C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--34
Exercise D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2--37

Pinging a Module’s EtherNet/IP Address


What You Will Learn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--1
Why These Skills Are Important . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--1
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--1
Overview of IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--1
Classes of IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--3
Private IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--4
Benefits of Using an IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--4
Table of Contents iii

Subnets and Subnet Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--5


How a Subnet Mask Operates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--5
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--6
Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--7
Data Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--8
Ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--9
ARP (Address Resolution Protocol) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--10
Here’s How . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--11

Exercise: Pinging a Module’s EtherNet/IP Address


Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--13
How Did You Do? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--14
Exercise B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--14
How Did You Do? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--15
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--16
Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--16
Exercise B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3--16

Configuring and Modifying EtherNet/IP Addresses Using BOOTP- DHCP Server Software
What You Will Learn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4--1
Why These Skills Are Important . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4--1
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4--1
BOOTP-DHCP Server Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4--1
Here’s How . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4--4

Exercise: Configuring and Modifying EtherNet/IP Addresses Using BOOTP-DHCP


Server Software
Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4--5
How Did You Do? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4--6
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4--8
Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4--8

Configuring and Modifying EtherNet/IP Addresses Using RSLinx Software


What You Will Learn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5--1
Why These Skills Are Important . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5--1
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5--1
RSLinx Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5--1
Here’s How . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5--3

Exercise: Configuring and Modifying EtherNet/IP Addresses Using RSLinx Software


Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5--5
How Did You Do? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5--7
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5--8
Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5--8
iv Table of Contents

Configuring and Modifying EtherNet/IP Addresses Using RSLogix 5000 Software


What You Will Learn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6--1
Why These Skills Are Important . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6--1
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6--1
Configuring and Modifying Ethernet IP Addresses and Masks . . . . . . . . . . . . . . . . . . . . . . . . . . 6--1
Here’s How . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6--4

Exercise: Configuring and Modifying EtherNet/IP Addresses Using


RSLogix 5000 Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6--5
How Did You Do? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6--9
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6--10
Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6--10

Configuring the 9300-8EDM Ethernet Diagnostic Module


What You Will Learn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--1
Why These Skills Are Important . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--1
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--1
9300-8EDM Diagnostic Module Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--1
Network Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--2
MAC Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--3
IGMP Snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--4
Alarm Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--4
Port Mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--5
Here’s How . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--7

Exercise: Configuring the 9300-8EDM Ethernet Diagnostic Module


Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--9
How Did You Do? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--12
Exercise B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--12
How Did You Do? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--13
Exercise C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--13
How Did You Do? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--15
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--16
Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--16
Exercise B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--16
Exercise C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7--18

Establishing EtherNet/IP Connections to Remote Devices


What You Will Learn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8--1
Why These Skills Are Important . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8--1
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8--1
Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8--1
I/O Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8--1
Table of Contents v

Example: Redesignating a Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8--3


Electronic Keying Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8--3
Communications Format Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8--5
Rack Optimization Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8--6
Example: Rack-Optimized Communications -- RPI Selection . . . . . . . . . . . . . . . . . . . . . . . . . . 8--7
Example: Rack-Optimized Communications -- Direct Connections . . . . . . . . . . . . . . . . . . . . . . 8--8
Module Configuration Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8--9
Here’s How . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8--10

Exercise: Establishing EtherNet/IP Connections to Remote Devices


Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8--11
How Did You Do? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8--13
Exercise B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8--14
How Did You Do? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8--16
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8--18
Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8--18
Exercise B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8--21

Producing and Consuming Data over an EtherNet/IP Network


What You Will Learn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9--1
Why These Skills Are Important . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9--1
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9--1
Key Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9--1
Producing and Consuming Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9--2
Produce/Consume Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9--2
Network Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9--3
Produced and Consumed Tag Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9--3
Produced and Consumed Arrays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9--4
Creating a Produced Tag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9--5
Creating a Consumed Tag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9--6
Here’s How . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9--8

Exercise: Producing and Consuming Data over an EtherNet/IP Network


Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9--9
How Did You Do? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9--11
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9--12
Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9--12

Communicating between Multiple Controllers on an EtherNet/IP Network


Using a Message Instruction
What You Will Learn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10--1
Why These Skills Are Important . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10--1
Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10--1
Key Messaging Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10--1
vi Table of Contents

Connection Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10--2


Enabling Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10--2
Configuring a Message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10--3
Communications Path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10--6
Message Execution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10--7
Monitoring Data Transfers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10--8
Here’s How . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10--8

Exercise: Communicating between Multiple Controllers on an EtherNet/IP Network


Using a Message Instruction
Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10--9
How Did You Do? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10--11
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10--12
Exercise A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10--12

Appendix A
Data Layout for the 9300--8EDM Ethernet Diagnostic Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . A--1
Course Overview I

Opening Comments: Course Overview


Welcome students.
Give administrative details:
1. Class hours
2. Break times
3. Cafeteria information
4. Telephones
5. Restroom locations
Ask each student to share:
1. Name and title
2. Company and location
3. How they use EtherNet/IP networks
on the job

Course Purpose This course prepares you to successfully design and configure an
efficient EtherNet/IPt (Industrial Protocol) network by managing
both the bandwidth requirements for a project and the number of
connections on the network. The course focuses on integrating
Logix5000t controllers and EtherNet/IP modules in the design and
configuration of an EtherNet/IP network for optimal performance.

You will configure the 9300--8EDM Ethernet diagnostic module for


viewing and controlling network traffic, restricting traffic overload,
and protecting against unauthorized device access. You will also
modify Logix5000 projects to use an EtherNet/IP network as the
communications link between a Logix5000 controller and the local
and remote digital and analog devices it controls.

Who Should Attend Individuals responsible for designing and configuring a new
EtherNet/IP network or managing and modifying an existing
EtherNet/IP network should attend this course. This course is not
intended for individuals who want to maintain and troubleshoot an
existing EtherNet/IP network.

Prerequisites To successfully complete this course, students must be able to


perform basic Microsoft Windowsr tasks, such as using a mouse,
opening and saving files, and moving windows.

Poll the class at this time to determine Students should also have successfully completed one or more of the
the amount of RSLogix 5000 experience following courses (or demonstrate equivalent experience):
the students have. If the class has a
significant amount of RSLogix 5000 • RSLogixt 5000 Level 2: Basic Ladder Logic Programming
experience, several exercises in the (CCP151)
course may take less time than
indicated. • RSLogix 5000 Level 3: Project Development (CCP143)

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
overview
II Course Overview

Agenda This course consists of the following lessons:


Day 1
20 minutes • Course Overview
120 minutes • Designing an EtherNet/IP Cable System
120 minutes • Optimizing an EtherNet/IP Network
70 minutes • Pinging a Module’s EtherNet/IP Address
40 minutes • Configuring and Modifying EtherNet/IP Addresses Using
BOOTP--DHCP Server Software
40 minutes • Configuring and Modifying EtherNet/IP Addresses Using
RSLinx Software
Day 2
50 minutes • Configuring and Modifying EtherNet/IP Addresses Using
RSLogix 5000 Software
90 minutes • Configuring the 9300--8EDM Ethernet Diagnostic Module
90 minutes • Establishing EtherNet/IP Connections to Remote Devices
80 minutes • Producing and Consuming Data over an Ethernet/IP Network
90 minutes • Communicating between Multiple Controllers on an Ethernet/IP
Network Using a Message Instruction

Meeting Course Objectives The following course structure is generally used to facilitate your
ability to meet the course objectives:
• One lesson is devoted to each task.
• Typical lesson includes most or all of these sections:
-- “What You Will Learn” -- lesson objectives
-- “Before You Begin” -- preparatory material
-- “Here’s How” -- demonstration of procedures
-- “Exercise” -- opportunity to perform new skills, often in a
hands-on lab environment
-- “How Did You Do?” -- where to go for feedback on
performance
-- “Answers” -- answers to exercises

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
overview
Course Overview III

Student Materials To enhance and facilitate your learning experience, the following
materials are provided as part of the course package:
• Student Manual, which contains the key concepts, definitions,
and examples presented in the course and includes the hands-on
exercises.
Hold up the procedures guide. Show the • EtherNet/IP Procedures Guide, which provides all the steps
Table of Contents, one or two required to complete common EtherNet/IP tasks, including the
procedures, and the Glossary. Note that
this guide will be a good reference when tasks in the exercises. By following the procedures in this job aid,
students are completing tasks back on you can immediately apply what is learned in the course to your
the job. own job.
Show the students the documentation • EtherNet/IP Documentation Reference Guide, which contains
reference guide. Take a moment to show several relevant technical publications. This searchable, electronic
the main screen, the list of publications,
and the search options. resource contains the most frequently referenced information and
is a quick and efficient on-the-job resource.

Hands-On Exercises Throughout this course, you will have the opportunity to practice the
skills you have learned through a variety of hands-on exercises.
These exercises focus on the skills introduced in each lesson. To
complete the exercises, you will use an EtherNet/IP workstation.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
overview
IV Course Overview

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
overview
Lesson 1
Designing an EtherNet/IP Cable
System

What You Will Learn After completing this lesson, you should be able to:
Inform the students that this is not an • Identify an environment class
in-depth course on Ethernet and its
associated protocols. In this lesson, they • Select EtherNet/IP network hardware components
will be given a cursory overview of the • Select cable system components
Ethernet technology so as to have a
common background as they learn and • Select a network topology
explore the various facets of designing
and configuring an EtherNet/IP network. • Select a wiring scheme
• Identify network and operational requirements

Why These Skills Are Important

These skills will expose you to the terminology and hardware


components used in designing a communications network. Armed
with this knowledge, you will be able to effectively communicate
your system requirements to your IT department to develop an
efficient and functioning EtherNet/IPt network.

Before You Begin EtherNet/IP Network Overview

Ethernet Network: A high speed, information network designed


primarily for communications between computers and peripheral
devices:
• Is widely accepted and has become the “defacto” standard for
information networks
• Can be used with a wide range of devices available from many
different vendors
• Was widely used in office networks for decades and now is used
on the plant floor as well
• Allows data to be easily exchanged between the plant floor and
office networks
? Who owns or controls EtherNet/IP? EtherNet/IP (Industrial Protocol) Network: An Ethernet network
Answer: Technically, no one owns it;
that uses CIP (Common Industrial Protocol) at the application layer
however, EtherNet/IP is a trademark of of the OSI model, enabling interconnectivity with other networks
ControlNet International under license that use CIP at the application layer.
by ODVA (Open DeviceNet Vendor
Association).
CIP (Common Industrial Protocol): The application layer of the
OSI (open system interconnection) model that enables I/O control
over an EtherNet/IP network. This layer also bridges EtherNet/IP
devices with devices on networks such as ControlNett and
DeviceNett that also use CIP at the application layer.
Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
desib300
1--2 Designing an EtherNet/IP Cable System

Tip " Standard EtherNet/IP and Ethernet CIP safety modules can
communicate on the same network.

OSI (Open System Interconnection) Model: A networking model


that allows all types of networks to interconnect by specifying the
protocols to be used for communications.

Briefly explain the OSI model. The OSI model consists of seven layers, each of which uses the
services of the layer below it and supplies higher level services to the
layer above it to communicate. An EtherNet/IP network (as opposed
to a “traditional” Ethernet network) is defined by the CIP protocol
used at the application layer (layer 7) of this model.

Indicate to the students that the upper The following table correlates the seven layers with some common
three layers are commonly grouped protocol:
together under the CIP stack. Additional
examples at the specific layers are:
Layer Protocol
Session: NCP, RPC, ADSP
Application CIP, CSP
Presentation: SAP, RPC, AFP Presentation HTTP
Application: NFS, SNMP, MIME Session FTP, TELNET
Transport TCP, UDP
Network IP
Data Link Ethernet
Physical 10/100baseT, Transceiver, etc.

Packet: The data transmission unit exchanged at the network layer.


One of the key features of a packet is that it contains the address(es)
of the destination device(s) in addition to data.

Environment Class

When designing, installing, and selecting hardware components for


Briefly point out the environmental an EtherNet/IP network, you should be aware of the environment in
classifications for the four types of the areas where cabling and equipment will be installed. By
conditions.
systematically classifying the environments in installation areas,
decisions can be made on hardware component selections and
Mention that the ODVA is an additional mitigation needs.
international association comprised of
members from the world’s leading
automation companies. This
organization supports network
technologies built on the Common
Industrial Protocol (CIP).

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
desib300
Designing an EtherNet/IP Cable System 1--3

The ODVA’s Mechanical Ingress Climatic and EMC (MICE) concept


is important for classifying an installation environment in terms of
environmental and EMI (electromagnetic interference) levels:

Climatic EMC
Mechanical Ingress
Chemical (Electromagnetic)
Electrostatic
Shock Liquid particles Temperature
discharge
Radiated and
Vibration Humidity conducted radio
frequency
Contaminants
Crush Transients
(dry and liquid)
Impact Solar radiation Magnetic fields

The MICE concept defines three distinct areas or classifications:


Mention that MICE 1 is for normal • MICE 1 is for office or commercial environments (M1, I1, C1,
environments. and E1)
• MICE 2 is for light industrial environments (M2, I2, C2, and E2)
• MICE 3 is for industrial or harsh environments (M3, I3, C3, and
E3)
Using the MICE concept, a designer can balance component costs
with mitigation costs to design a cost-effective cabling system.

Tip " For further detailed information on the MICE concept, see the
ODVA’s EtherNet/IP Media Planning and Installation Manual at
http://www.odva.org.

EtherNet/IP Network Hardware Components

Ethernet Backbone: Part of the network that handles the major


network traffic. It uses the highest speed transmission paths in the
network.

Bridges are used when there is too Bridge: A software tool used to filter data between segments based
much traffic on a network. They save on MAC addresses of the data packets before they are transmitted:
bandwidth by restricting which segments
see which packets; however, broadcast Only messages between
messages traverse network segments nodes on different segments
and therefore negatively impact network pass through the bridge.
performance.
Bridges can connect different media
types together.
Segment A Segment B
Bridge

Segment A
00BC03 . . .
Messages between 00AE44 . . . Messages between
nodes on segment A nodes on segment B
stay on segment A. stay on segment B.
Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
desib300
1--4 Designing an EtherNet/IP Cable System

Gateway: A router that translates data between different formats.

The type of transceiver used on an Transceivers: Hardware devices responsible for the reception and
Ethernet device determines the type of transmission of electrical signals on a network. Every device on a
media that the device connects to.
network has a transceiver.

Mention that hubs are generally Hub: A hardware device that transmits data from one device to
discouraged in control applications. another within a segment. Hubs serve as a central connection point
They do not help to control collisions
among signals from devices for nodes on a star topology and serve as a multi-port repeater. These
concurrently accessing the network devices consume more network bandwidth than a switch and
media. decrease network performance:
A message coming in one port will Hubs do not selectively route packets
be broadcast out every other port. of information to specific devices.

Routers are used extensively on the Router: A device that connects network segments and routes
internet. Sometimes routers are referred messages via routing tables between networks. A router segments
to as “gateways.”
LANs to balance traffic within workgroups:

Router

When a message is received at the router,


it refers to its routing table to determine
which segment to route the message to.

Switches are different than hubs in that a Switch: A hardware device that connects multiple segments to
switch only transmits out the port that multiple ports and filters data (similar to a bridge). A switch is the
the message needs to be transmitted. A most critical component in an EtherNet/IP network as its filtering
switch is a multi-port bridge.
Rockwell Automation recommends that abilities allow it to reduce network congestion and increase the speed
managed switches be used on the plant of throughput on a network:
floor. Managed
switch criteria Incoming messages are only Switches selectively route packets of
will be discussed transmitted to desired node. information to specific devices.
later in this lesson.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
desib300
Designing an EtherNet/IP Cable System 1--5

Switches are available for standard 10/100 Mbps and 1 Gbps.


Switches are required rather than hubs for control applications in
which real-time data access is critical.

Switch Selection
Caution students about buying switches One critical component in designing an EtherNet/IP network is the
from the local computer store. Industrial selection and implementation of a switch. Switches must be chosen
switches, though expensive in the
beginning, will be a tremendous cost based on their suitability to the environment in which they will be
saver over time given the harsh working used. There are two types of switches:
conditions of the plant environment.
• Unmanaged
• Managed
Mention that unmanaged switches are Unmanaged switches are similar to hubs in that there is no
ideal for small, simple networks. configuration needed. Once unpacked, powered up, and connected to
a network, an unmanaged switch will build a routing table
automatically and forward frames out the appropriate ports with no
additional user intervention.

You assign an IP address to a managed switch and configure other


parameters for more control over the network. Some of the other
benefits of a managed switch include:
Explain that this reporting function is a • Ability to monitor the performance of the network, including
good way to manage the growth of your problems on specific ports and the workstations or servers
network or to troubleshoot problems.
attached
• Ability to set up broadcast domains within the network
• Ability to run single computers on managed switch ports or place
additional switches on those ports to allow for scalability
When selecting switches, the following features should be given
careful consideration when designing your industrial control
network:
• Full-Duplex Operation: A feature that allows the simultaneous
transmission of data in both directions on a signal carrier between
the sender and the receiver, i.e., bidirectional communications.
• IGMP (Internet Group Management Protocol): An Internet
protocol that provides a way for a computer logged onto the
Internet to report its multicast group membership to adjacent
routers.
Mention to the students that they can • IGMP Snooping: A feature that allows a switch to “listen in” on
readily find IGMP snooping and the IGMP conversation between hosts and routers. It can provide
port-mirroring software tools, such as
Sniffer, Wireshark and NetDecoder, on a simple yet effective means of reducing unwanted traffic from a
the Internet. network.
IGMP snooping constrains the flooding of multicast traffic by
dynamically configuring switch ports so that multicast traffic is
forwarded only to ports associated with a particular IP multicast
group.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
desib300
1--6 Designing an EtherNet/IP Cable System

Switches that support IGMP snooping “learn” which ports have


devices that are part of a particular multicast group and only
forward the multicast packets to the ports that are part of the
multicast group.
Explain that selecting switches that have • Port-Mirroring: A method of monitoring network traffic that
the ability to provide full duplex, (IGMP) forwards a copy of each incoming and outgoing packet from one
snooping and port mirroring is beneficial
in troubleshooting. port of a network switch to another port where the packet can be
studied.
-- Network administrator uses port-mirroring as a diagnostic tool
or debugging feature, especially when fending off an attack
against the network.
-- Network administrator is able to keep close track of switch
performance and alter it if necessary.
-- Network administrator can manage port-mirroring locally or
remotely.
• Wire-Speed Switching Fabric: A switch that can handle the
maximum data rate of the network on each of its ports without
dropping a packet.
• Simple Network Management Protocol (SNMP): The protocol
governing network management and the monitoring of network
devices and their functions. It is not necessarily limited to TCP/IP
networks.
Tell the students that because VLANs • VLAN (Virtual (or logical) Local Area Network): A definition
are based on logical instead of physical that maps workstations on some other basis than geographic
connections, they are extremely flexible.
location (e.g., by department, type of user, or primary
application). The virtual LAN controller can change or add
workstations and manage load balancing and bandwidth
allocation more easily than with a physical picture of the LAN:

Accounting Engineering

Production Human Resources

Point out that VLANs reduce With VLANs, you can configure a switch to share two isolated
management effort to create networks without the traffic from one network burdening the
subnetworks and increase control over
multiple traffic types. other. IP multicast traffic from VLAN 1 will not reach VLAN 2.
A VLAN blocks broadcast traffic and adds a measure of security
between networks.
Also, each VLAN has a separate subnetwork which is part of the
isolation for example that keeps the PC in VLAN 1 from
communicating with the controller in VLAN 2.
E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
desib300
Designing an EtherNet/IP Cable System 1--7

Controller 1 PC Controller 2

1 3 2

VLAN 1 VLAN 2

4 5 6 7 8

I/O I/O I/O I/O

I/O

• Web Server: A program that, using the client/server model and


the World Wide Web’s Hypertext Transfer Protocol (HTTP),
serves the files that form web pages to web users (whose
computers contain HTTP clients that forward their requests):
-- Computers host web sites on the Internet by means of a web
server program.
-- Web servers often come as part of a larger package of Internet-
and intranet-related programs for serving email, downloading
requests for File Transfer Protocol (FTP) files, and building
and publishing web pages.

Mention that a designer should provide Besides switch type selection, you must determine the number of
for growth of at least 20% in case of switches and the number of ports for each switch chassis. Each
system expansion.
network device will require a corresponding switch port for
connection to the network.

Cable System Components

There are two types of EtherNet/IP cabling:


• Copper: Used in most applications and many Ethernet standards
require copper cabling. Copper cables are easy to use and less
expensive for installation purposes.
Mention that fiber optic cabling provides • Fiber optic: Used to carry voice, video, and data, and has an
higher noise immunity than other cabling enormous bandwidth. Fiber optic cabling can carry signals for
options.
extremely long distances and when designed correctly is
generally immune to electromagnetic interference.
When planning a network that offers the best noise immunity, use the
lowest data rate at which your application will run (10 Mbps and 100
Mbps) and use either shielded cable or fiber optic cable.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
desib300
1--8 Designing an EtherNet/IP Cable System

Copper Cabling
There are two types of copper cabling:
Tell the students that coaxial cable is not • Coaxial: A cable constructed of an insulated center conductor
used very much because of its 10 Mbps surrounded by a shield. This cable can carry high-frequency or
limit.
broadband signals.
Mention that twisted pair is ordinary • Twisted-Pair: Two insulated wires twisted around each other at
copper wire that connects home and regular intervals. The number of twists per foot directly relates to
many business computers to the
telephone company. the relative noise immunity of the pair. There are two
twisted-pair cable types:
-- Shielded, balanced twisted-pair (STP/ScTP): Two insulated
twisted wires that have a foil jacket to prevent crosstalk and
Tell the students that if their application noise from an outside source. STP/ScTP should be used in
includes drives greater than 10 HP, high high-EMI (electromagnetic interference), noisy environments
current devices, or electrostatic
processes then they should use shielded and in applications that require conduit.
cabling.
Shielded cables should not be used in
environments that are likely to have ground
offsets due to electrical storms or poorly grounded
buildings/installations.

-- Unshielded twisted pair (UTP): Two insulated wires twisted


together. UPT is used in most applications except where there
is high electrical, fast transient noises and high radio
frequency (RF) energy.
Mention that these factors fall under the An EtherNet/IP network’s immunity to noise is influenced by the
“E3” section of the MICE table. following cable design factors:
• Cabling category used:
-- CAT 5E: Supports 10/100/1000 Mbps and 1 Gbps equipment
-- CAT 6: Supports 10/100/1000 Mbps and 10 Gbps equipment
and provides a reduced channel length at 10 Gbps
-- CAT 6E: Supports 10/100/1000 Mbps and 10 Gbps equipment
and provides full 100 meter channel length at 10 Gbps
• Measurement of balance for cables:
Mention that balance is important in -- Transverse Conversion Loss (TCL): Loss from balanced
reducing residual and burst errors from a signal to unbalanced signal measured at the near end of the
noise perspective.
cable.
Point out that TCL and ELTCTL are -- Equal Level Transverse Conversion Transfer Loss
balance parameters. (ELTCTL): Loss from balanced signal at the near end to
unbalanced signal at the far end.
• Coupling attenuation of shielded cables
• Measurement of cable return loss
• Measurement of wire gauge at high temperatures
• Length of the channel
• Use of shield/unshielded cables
• Grounding and bonding of the building and equipment
E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
desib300
Designing an EtherNet/IP Cable System 1--9

Two-Pair Cabling vs Four-Pair Cabling


Careful long-range planning should be done before selecting a cable
pair count. If your plans are to migrate to higher data rates in the
future, then select cables and components that will support future
requirements.

Mention that two-pair cables will not Two-pair cabling consists of a total of four wires, with two wires
support future expansion and/or other twisted in a pair. Four-pair cabling consists of a total of eight wires,
services. These cables may not support
1 Gbps and 10 Gbps applications. which are twisted into four pairs of two wires each. The use of star
quad 4 conductor cables is not recommended.

Two-pair cables are easier to use than four-pair cables and have less
chance of crosstalk of a signal into adjacent channels or into another
part of a system. Two-pair cables are suitable for use in the following
applications:
• Machine applications
• Flexible applications
Mention that an example of high flexible • High flexible applications
applications is one that uses robots.
• Elevated noise applications
Four-pair cabling should be used in the following applications:
• Applications that support multi-services, such as voice, video,
and data
• Applications that might be subject to future increased traffic

Fiber Optic Cabling


Explain that for future network Fiber optic cabling is comprised of either a center glass or plastic
expansion and maintenance/failure core surrounded by two or three layers of protective materials. This
replacements, the designer should
consider specifying additional or spare type of cabling also has a reflective coating. Fiber optic cabling
fibers for backbone cabling. transmits light rather than electronic signals eliminating the problem
of electrical interference.

Fiber optic cable has the ability to transmit signals over much longer
distances than coaxial and twisted pair. It also has the capability to
carry information at greater speeds.

Fiber optic cabling should be considered in the following instances:


• High magnetic fields, such as induction heating processes
• Applications that cannot tolerate disruptions
• Poorly grounded systems
• Outdoor applications
• Extreme high noise environments

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
desib300
1--10 Designing an EtherNet/IP Cable System

Connectors
The following are copper connector types supported by EtherNet/IP
communications:
Explain that the “RJ” in RJ45 means • Encapsulated 8-Way Modular Connector (RJ45): Used in
Registered Jack. two-pair cabling.
Mention that both connector designs -- Sealed 8-way modular connectors are suitable for use in
provide sealing to IP65/67 in accordance information and control applications.
with the IEC60529 standard
(International Protection Class).

8-Way Modular Sealed Jack and 8-Way Modular Sealed Jack and
Plug in a Metal Housing Plug in a Plastic Housing

• 4-Pole M12 “D” Coded Connectors: Used in two-pair and


four-pair cabling.

• Bulkhead Connectors: Used wherever connectivity through an


enclosure is required.
Explain that FEXT occurs when signal -- Should be located within the enclosure to minimize exposure
leakage from adjoining wire pairs at the to liquids, dust and vibration.
far end of the transmitter creates
electrical noise.
Use bulkhead connectors sparingly because
they may cause return loss failures and far-end
crosstalk failures.

M12 (IP65/IP67) to IP20 8-Way


Modular Connector

Cord sets, patch cords, or jumpers are a piece of cable with two
connectors on either end. Basic construction of cords is a male/plug
connector on both ends of the cable since most active and passive
devices come equipped with a female/receptacle jack.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
desib300
Designing an EtherNet/IP Cable System 1--11

The following are fiber optic connector types supported by


EtherNet/IP communications:
Briefly point out the fiber optic connector • ST
types.
• SC
• LC
• Micro FX

Sealed LC

Sealed Micro FX

EtherNet/IP Network Topologies

Briefly mention that ring and token ring Network Topology: A description of the structure that provides the
topologies are not used in EtherNet/IP communications interconnection among nodes of a network in terms
networks.
of its layout. In communication networks, a topology is usually a
schematic description of the arrangement of a network, including its
nodes and connecting lines.

Bus Topology: Every device is connected to a main cable called the


bus. Therefore, in effect, each device is directly connected to every
other device in the network.

Bus topologies are used when coaxial media is desired:

Tip " This topology is used with many existing Ethernet network
architectures but it is seldom used in new architectures.

Star Topology: A central device to which all end devices are


Mention that the benefit of a star directly connected. Every end device is indirectly connected to every
topology is in its support of 10/100 Mbps other one through the central device.
products.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
desib300
1--12 Designing an EtherNet/IP Cable System

Star topologies are best suited for environments using twisted pair
and/or fiber optic wire:

Tip " This is the most common topology used in EtherNet/IP network
architectures.

Tell the students that it is possible to use Tree (Combination) Topology: Uses two or more star networks
different cables within a topology. connected together. The central computers of the star networks are
Example: Coaxial cabling can be used
for the bus portion and twisted-pair can connected to a main bus. Thus, a tree network is a bus network of
be used in the star networks. star networks:

Tip " The tree topology should also be given careful consideration when
designing an EtherNet/IP network as it effectively blends the
advantages of a star and bus topology.

Wiring Schemes

Point out that some applications will The total length of each horizontal cable segment must not exceed
require more jumpers. In these 100 meters between any two active devices or 90 meters with two 5
applications, the total length of
horizontal wiring must be adjusted to meter jumpers or patch cords.
compensate for the added loss of each
connector pair.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
desib300
Designing an EtherNet/IP Cable System 1--13

There are three EtherNet/IP wiring schemes:


Explain that the generic wiring scheme • Generic Wiring Scheme: Used in generic cable system
will reside somewhere in the building applications. Supports all data rates. This wiring scheme shows
and maybe controlled by the IT group.
the complete standards for the telecommunications infrastructure:

PLC Switch Wall Outlet


(Telephone)
Patch
Cord Work Area I/O
Cord
Work Area
Cross Connect
Cord
Wall Outlet
(Telephone) Horizontal Cabling

Mention that this wiring scheme • Semi-Modular Wiring Scheme: Used in applications, such as
sacrifices flexibility and is not compliant control, where there are numerous enclosures to protect
to TIA standards.
equipment.
Point out that this wiring scheme saves
on space and cost.

Automation
PLC Switch Outlet

I/O
Industrial Work
Industrial Patch Cord Area Cord

Work Area
Cord

• Point-To-Point Wiring Scheme: Used in most applications. It is


simple, highly reliable, least expensive and occupies minimal
space:

PLC Switch

I/O
Industrial Patch Cord
Work Area
Cord

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
desib300
1--14 Designing an EtherNet/IP Cable System

Briefly discuss the wiring guidelines. When wiring EtherNet/IP cables, follow these guidelines:
• If a cable must cross power lines, cross it at right angles.
• Route at least 1.5 m (5 feet) from high-voltage enclosures or
sources of RF/microwave radiation, induction-heating equipment.
• If the conductor is in a metal pathway or conduit, bond each
section of the wireway or conduit to the adjacent section so that is
has electrical continuity along its entire length. Each section
should be bonded to the enclosure at the entry point.
• If you need to protect or route an Ethernet cable in a metal
conduit then you should use a shielded cable. The shield must not
come in contact with the conduit at any point.

Grounding and Bonding


There are two methods for grounding and bonding of equipment:
• Star grounding
Mention that equipotential grounding is • Equipotential grounding
also known as highly mesh grounding.
Noise currents in ground paths generated by high currents can be
controlled by a star earthing system and by isolating the signal
Point out that star grounding is primarily ground from the equipment ground. This is accomplished by
done in North America. providing two star grounds, one for the equipment and a second one
for the communications equipment.

Point out that if the condition of your Shields for the communications equipment shall be referenced only
building wiring and grounding system is to the signal ground and no equipment shall be referenced to the
not known, then star grounding is
recommended. signal ground. The star grounds of the two systems shall converge to
one point within the building:
Conductive Path for Noise
Shielded Communications Cable

Enclosure Enclosure
#1 #2

Communications
PE Common
Common

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
desib300
Designing an EtherNet/IP Cable System 1--15

If there is no equal potential or the building earth system is not of


Tell the students that all Rockwell low impedance or has excessive noise, then only one end of the cable
Automation EtherNet/IP products use shield should be terminated. The device’s end should be open at the
this shield termination method.
connector. The shield should be continuous up to the connector at the
device:

STP Cable
DEVICE
TERMINATION
Earth Grounded
Cable Shield

.01 uF 1
500V Meg MOV

STP Cable
DEVICE
TERMINATION
Earth Grounded

Equipment is normally arranged as a grounded system, whereby the


Mention that the only noise currents on ground of the power feed is connected to the functional ground over
the PE connection are from devices that a large area using the TN-S system. The TN-System decreases the
have coupling mechanisms to the local
ground connections, such as motors and noise on the protective earth (PE) connection by separating the
drive controllers. neutral conductor and PE conductor into two circuits.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
desib300
1--16 Designing an EtherNet/IP Cable System

The shield of the bus cable is connected to the potential equalization


system over a large area where it enters the control cabinet. The
potential equalization rail is grounded in each control cabinet and
connected to the potential equalization rails on the other control
Point out that equipotential grounding is cabinets:
common in Europe.

Enclosure Enclosure
#1 #2

Shielded
Communication
Unshielded Cables
Shielded Communication
Communication Cable
Cables

Motor

Network and Operational Requirements

Briefly go over these network and In order to design an effective EtherNet/IP network, it is essential
operational requirements. that the control network is separated from the information (office)
environment. Some common practices to achieving this goal include:
• Use industrial grade media and components
• Minimize device load due to unwanted IP multicast traffic
• Minimize switch load due to unwanted IP multicast traffic
• Minimize network load due to unwanted incoming IP multicast or
broadcast traffic
• Block IP multicast traffic generated within the EtherNet/IP
sub-net from propagation into the plant network
• Block traffic, especially broadcast traffic like streaming video,
from the plant network from propagating to the EtherNet/IP
sub-net

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
desib300
Designing an EtherNet/IP Cable System 1--17

• Implement standard network troubleshooting tools


• Account for device limitations
• Obtain schematics of existing network architecture(s) and plant
floor devices
• Predict/determine volumes of data to be used in the project
• Obtain functional specifications and data costs of EtherNet/IP
modules
• Obtain functional specifications and data costs of Ethernet cables,
routers, and switches
• Verify final network media
• Obtain IP addresses from IT department for all current and
projected Ethernet and/or EtherNet/IP devices on the EtherNet/IP
network
• Make decisions on system implementation

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
desib300
1--18 Designing an EtherNet/IP Cable System

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
desib300
Exercise: Designing an EtherNet/IP Cable System 1--19

Exercise: Designing an EtherNet/IP


Cable System

Exercise A In this exercise, you will practice designing an EtherNet/IP network.

Context:

When installing an EtherNet/IP network on the plant floor,


employing the correct topology, hardware, and media are critical
aspects in the design phase.

For help performing steps in this exercise, see the associated job
aid(s).

Directions:

1. As the corporate system designer, your manager wants you to


identify/describe the difference(s) between an Ethernet and an
EtherNet/IP network. What would you say?

2. As a system designer, you are responsible for designing,


installing, and selecting hardware components for an EtherNet/IP
network that will be used for a new automotive frame
manufacturing line. The line will use welding robots that produce
EMI levels. The plant floor has mechanical shock at >150 ms.
Identify the environmental class:

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
dese300
1--20 Exercise: Designing an EtherNet/IP Cable System

3. In designing your EtherNet/IP network, you will want to know if


a certain media device(s) is an internal component of any device
placed on the EtherNet/IP network. Identify this media device
and explain why it is important to know if it is built within a
device placed in the EtherNet/IP network.

4. You are responsible for designing a cabling system. Application


specifications indicate conduit is required and the environment is
extremely noise. You decide to go with inexpensive cabling that
is easy to use and has a less chance of crosstalk. What type of
cabling do you select?

5. What is the preferred network topology you should use on your


plant floor? Identify two advantages to using this topology.

6. Which wiring scheme is least expensive, highly reliable, and is


used in most applications?

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
dese300
Exercise: Designing an EtherNet/IP Cable System 1--21

7. In designing your EtherNet/IP network, what is the most critical


component of the network? Identify two selection criteria that
should be used when selecting this component for use in your
network.

8. In order to design an effective EtherNet/IP network, it is essential


that the control network is separated from the information (office)
environment. Identify five common practices to achieving this
goal:

How Did You Do? Turn to the Answers section.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
dese300
1--22 Exercise: Designing an EtherNet/IP Cable System

Answers Exercise A

1. An EtherNet/IP network is an Ethernet network that uses CIP at


the application layer of the OSI model, enabling
interconnectivity with other networks that use CIP at the
application layer (e.g., DeviceNett, ControlNett) thereby
enabling I/O control.
2. The EtherNet/IP cabling system environment class for the
automotive manufacturing line:
• M3 (mechanical shock and industrial environment)
• E3 (electromagnetic interference levels and industrial
environment)
3. Each device on the EtherNet/IP network requires a transceiver
to transmit and receive electrical signals. If the transceiver is
not an internal component on a network device, an external
transceiver will need to be requested prior to the
installation/implementation phase of the project.
4. Shielded, balanced twisted-pair (STP/ScTP) copper cabling is
less expensive than fiber optic cabling . Two-pair STP/ScTP
cabling is easier to use than four-pair cabling. This cabling is
used in noisy environments and in applications that require
conduit.
5. Ideally, a star (or tree) topology should be used in a plant floor
environment as it:
• Employs the same technology as a switch
• Is easier to troubleshoot network problems
• Is easier to add or remove devices from the network
• Segregates communications
6. The point-to-point wiring scheme is used in most applications
and is simple, highly reliable, least expensive, and occupies
minimal space.
7. The most critical component in an EtherNet/IP network is (or
should be) a (Managed) Switch. The minimum required
features in an industrial environment are:
• Full-duplex on all ports
• IGMP Snooping
• Port-mirroring
• 100 Mbps

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
dese300
Exercise: Designing an EtherNet/IP Cable System 1--23

8. In order to design an effective EtherNet/IP network, it is


essential that the control network is separated from the
information (office) environment. Some common practices to
achieving this goal include:
• Use industrial grade media and components
• Minimize device load due to unwanted IP multicast traffic
• Minimize switch load due to unwanted IP multicast traffic
• Minimize network load due to unwanted incoming IP
multicast or broadcast traffic
• Block IP multicast traffic generated within the EtherNet/IP
sub-net from propagation into the plant network
• Block traffic, especially broadcast traffic like streaming
video, from the plant network from propagating to the
EtherNet/IP sub-net
• Implement standard network troubleshooting tools
• Account for device limitations
• Obtain schematics of existing network architecture(s) and
plant floor devices
• Predict/determine volumes of data to be used in the project
• Obtain functional specifications and data costs of
EtherNet/IP modules
• Obtain functional specifications and data costs of Ethernet
cables, routers, and switches
• Verify final network media
• Obtain IP addresses from IT department for all current and
projected Ethernet and/or EtherNet/IP devices on the
EtherNet/IP network
• Make decisions on system implementation

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
dese300
1--24 Exercise: Designing an EtherNet/IP Cable System

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
dese300
Lesson 2
Optimizing an EtherNet/IP Network

What You Will Learn After completing this lesson, you should be able to:
• Determine the total number of CIP connections on a network:
-- Identify what CIP and TCP connections are
-- Identify types of CIP connections
-- Identify what a multicast address is
-- Count CIP connections
• Determine system bandwidth requirements
• Predict maximum input and output times for CIP connections
• Determine HMI nominal system limitations
• Identify alternative module and connection strategies

Why These Skills Are Important

These skills will assist you in optimizing your EtherNet/IP network’s


performance. Investigating the limitations of both the network and
the devices on a network are critical to obtaining peak performance
from your network.

Before You Begin EtherNet/IP Network Optimization

Optimizing the performance of an EtherNet/IP network is dependent


upon three factors:
• Total number of CIP connections on the network
• Bandwidth allocation
• Predicting the maximum input or output times for CIP
connections

Key Terms

Cached connections should be used Cached Connection: A continuously open connection associated
when an MSG instruction will execute with an MSG instruction.
repeatedly.
Connection: A communications mechanism (path) that transfers data
between two modules within a system, for example, between a
controller and an I/O module.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
maxib300
2--2 Optimizing an EtherNet/IP Network

Explain that explicit connections do not Explicit Connection: A network connection used to transfer
use an RPI. non-critical data such as that used in device configuration or data
? What are some examples of an collection:
• The process of downloading programs/projects and the messaging
explicit connection?
that occurs between processors or controllers
Answer: MSG instructions, PanelView
Plus terminals, RSView graphic displays • Commonly referred to as a Class 3 connection
• A connection that does not use an RPI
State that implicit connections use an Implicit Connection: A network connection used to transfer
RPI. real-time I/O data (e.g., rack-optimized connections, direct
? What are some examples of an connections, produced-consumed connections):
• Commonly referred to as a Class 1 connection
implicit connection?
Answer: Rack-optimized connections; • A connection that uses an RPI
direct connections, PanelView terminals
RPI (Requested Packet Interval): The maximum amount of time
Note: PanelView terminals can establish before data is sent to a Logix5000 module.
either an implicit or explicit connection.
Inform the students that data may be RTS (Real Time Sampling Rate): A parameter that instructs a
transmitted faster than the RPI they Logix5000 analog module to scan all of the input channels, store the
assign to a module.
data in the on-board memory, and multicast the updated channel data
and other status data to the backplane of the local chassis.

CIP Connections

State that CIP can also be used when CIP (Common Industrial Protocol) Connection: A transfer of data
no I/O is involved. from an application running on one end node to an application
running on another end node. CIP is an open protocol managed by
ODVA. A CIP connection is required to control a rack of I/O
devices.

CIP vs TCP Connections


TCP (Transmission Control Protocol) Connection: A connection
that establishes a “three-way handshake” at the transport layer. Once
established, the connection is maintained until such time as the
message or messages to be exchanged by the application programs at
each end have been exchanged.

EtherNet/IP networks use two types of connections on a network,


TCP and CIP:
• TCP connections are used at the OSI transport layer.
• CIP connections are established at the OSI application layer.
• Every CIP connection requires a TCP connection.
• A single TCP connection is capable of supporting one or more
CIP connections (e.g., consumed tags).

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
maxib300
Optimizing an EtherNet/IP Network 2--3

The benefits of TCP and CIP connections are reliability and speed:
Approximate timeout for an explicit • A TCP connection is extremely reliable since it requires a
message is 30 seconds. “three-way handshake” at the transport layer (i.e., a handshake
Approximate timeout for an implicit occurs between the devices).
message is the product of the RPI and a
network multiplier that is selected by the • A CIP connection provides reliability since each connection has a
controller’s firmware so that the timeout timer associated with it that recognizes the loss of
is greater than or equal to 100ms. communications.
• A CIP connection (implicit or explicit) provides high-speed
communications since their message overhead (e.g., source and
destination addresses) are predefined with a connection and are
not transmitted in each message.
TCP connections are:
• Used for all Ethernet communications
• Used and remain open when implicit communications are used
• Required for all CIP messaging, including connected and
unconnected (temporary/short lived) messaging

Types of CIP Connections


A CIP connection can be classified into one of the following four
categories:

CIP Connection Type Description


A connection that passes through the EtherNet/IP module to an
Bridged
end point other than the EtherNet/IP module.
End-node A connection whose end point is the EtherNet/IP module.
If you are teaching the standard course, An implicit message connection to a rack or assembly object in
rack optimization is covered in more the EtherNet/IP module. Data from selected digital I/O modules
detail. Rack-optimized
is collected and produced on one connection rather than on a
separate connection for each module.
Direct An implicit connection from a controller to a specific I/O module.

Multicast Addresses
Broadcast Message: A message sent from a single sender to every
node on a network.

Tell the students that input data can be Multicast Message: A message sent from a single sender to one or
sent using a multicast message. more recipients on a network.

Tell the students that output data can Unicast Message: Communication between a single sender and a
only be sent using a unicast message. single recipient over a network (i.e., point-to-point communications).

Implicit CIP input connections produce data over an EtherNet/IP


network using multicast addresses, allowing a producer to
simultaneously send the same message to multiple consumers:
• A produced tag requires only one multicast address to be
associated with it, but it requires one connection for each
consumer.
Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
maxib300
2--4 Optimizing an EtherNet/IP Network

• Multicast address limits associated with a device are independent


of the device’s connection limits.
• A multicast address is not required for every connection;
however, each EtherNet/IP module supports a maximum of 32
unique multicast addresses.
• For each module that produces a multicast message, the entire
block of 32 multicast addresses are reserved for that module
whether or not the addresses are all used.

Example: Multicast Address


? If rack optimization is employed, how A 1794-AENT module is multicasting to a rack of four digital I/O
many multicast addresses would be modules and two analog I/O modules. The 1794-AENT module
used? uses six of the 32 multicast modules allocated to it. The
Answer : Three; one for the remaining 26 multicast addresses can only be used by this
rack-optimized digital modules and one
for each of the analog I/O modules. module:
Digital I/O Modules
1794-AENT Module

Analog I/O Modules

Counting CIP Connections


Calculations involved in optimizing the throughput on a system can
be facilitated, if you know the number of the following types of
connections on the network:
State that this includes listen-only • Rack-optimized connections
rack-optimized connections.
• Direct connections
• Produced/consumed tag connections
Consumed Connection: In a Logix5000t system, a network
connection on the end of a controller that is receiving data from
another controller across a ControlBust backplane or over a
network such as EtherNet/IP by means of a consumed tag.

Direct Connection: In a Logix5000 system, an I/O communications


format that:
• Allows an EtherNet/IP module to collect digital I/O words
individually instead of in a rack image
• Uses more bandwidth than the alternative rack-optimized format
• Allows for transmission of diagnostic data in addition to I/O data

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
maxib300
Optimizing an EtherNet/IP Network 2--5

Listen-Only Rack--Optimized Connection: In a Logix5000 system,


an I/O connection that:
• Is owned by a different controller and provides the configuration
data for the I/O module
• Does not write configuration data
• Can only maintain the connection if the owner maintains a
connection.
Produced Connection: In a Logix5000 system, a network
connection on the end of a controller that is sending data to another
controller across a ControlBus backplane or over a network such as
EtherNet/IP by means of a produced tag.

Tell the students that if they plan on Rack Optimization: In a Logix5000 system, an I/O communications
using rack optimization, it is in their format that:
company’s best financial interest to
purchase non-diagnostic digital I/O • Enables an EtherNet/IP module to collect digital I/O words into a
modules for the optimized racks. rack image
• Conserves EtherNet/IP network bandwidth
• Conserves the number of connections
• Applies only one RPI (requested packet interval) value to all
modules (as assigned to the remote EtherNet/IP module)
• Limits the amount of status and diagnostic information that is
available
Emphasize to students that Rack-Optimized Connection: A connection between a
rack-optimization applies only to digital communications module (such as an EtherNet/IP module) and an I/O
I/O modules.
rack that enables the communications module to collect digital I/O
words into a rack image instead of collecting from each I/O module
separately.

Connection management plays a significant role in designing an


EtherNet/IP network for maximum throughput:
• The total number of CIP connections used/needed can be
obtained from the design worksheets and/or schematics used
when the system was initially designed.
Inform the students that some modules • The number and type of connections used on a network affect its
require (use) more than one connection. performance.
Example: A 1756-DNB module uses • As a system is developed and calculations are made, the number
two connections.
and type of connections used can be modified to improve the
Example: A 1784-PM02AE module system’s performance.
uses three connections.
• Limiting the use of available connections is important. Reduce
the number of connections on a system by using:
-- Rack-optimization
-- Non-cached MSG connections

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
maxib300
2--6 Optimizing an EtherNet/IP Network

Determining System Bandwidth Requirements

Bandwidth: The transmission capacity of a network, expressed in


packets per second.

State that these connections use an Packet: The data transmission unit exchanged at the network layer.
RPI. One of the key features of a packet is that it contains the address of
the destination device in addition to data.

The types of EtherNet/IP modules and connections used in a network


affect the bandwidth allocation for the EtherNet/IP modules on the
network:
• Predetermining the throughput on a system will identify if the
system has sufficient bandwidth to fulfill the requirements of an
application.
• Minimizing a module’s bandwidth allocation assists in
maximizing the system’s throughput.
Caution the students to be careful with • Bandwidth is measured by the total number of packets
their units: RPI is measured in ms while transmitted per second.
PPS is measured in seconds.
• The calculated bandwidth value varies jointly as the total number
of connections to a module and the RPI associated with the
connections vary.
• When determining if a module has enough bandwidth to support
an application, the amount of available bandwidth must be
segregated by its CIP connections.
• Implicit connections cannot consume more than 90% of a
module’s available bandwidth.
• At least 10% of the available bandwidth must be made available
for the explicit connections associated with the module.
This information is summarized in the following table:
(Recommended) Maximum (Recommended) Minimum
Total Available
Useable Bandwidth Reserved Bandwidth
Module Bandwidth
(packets/second) for Implicit (packets/second) for Explicit
(packets/second)
Connections (90%) Connections (10%)
1756-ENBT 5000 pps 4500 pps 500 pps
1756-ENET/B 900 pps 810 pps 90 pps
1788-ENBT 5000 pps 4500 pps 500 pps
1794-AENT 9500 pps 8600 pps 950 pps

The total number of packets/second for implicit


messaging should not exceed 90% of the total
bandwidth of each EtherNet/IP module in the
system. Failing to reserve at least 10% of each
EtherNet/IP module’s bandwidth, may prevent
you from going online with RSLogixt 5000
software or accessing the module’s embedded web
server.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
maxib300
Optimizing an EtherNet/IP Network 2--7

Tip " Since explicit messaging throughput is subject to both network and
target availability, simply reserving 10% of the total bandwidth does
not guarantee throughput.

Predicting Maximum Input or Output Times for CIP Connections

Emphasize that there is a minimum of CIP connections are efficient communications paths for high
two packets per RPI per CIP connection performance of I/O data on an EtherNet/IP network. CIP connections
as this fact will be used in calculating the
maximum input and output times for a are bidirectional, which means that during every RPI interval, a
system. packet of information is initiated at both ends of a connection (i.e.,
there is a minimum of two packets per RPI per CIP connection).

State that the first two factors are the The response speed of devices on an EtherNet/IP network are
main influencers. dependent on several factors:
• RPI
• Number of implicit connections
Tell the students that there is input delay • System delays:
for output modules.
-- Input filters
-- Transmission
-- Queueing
-- Switch latencies
Using these factors, it is possible to approximate the maximum input
or output times for a system. Once calculated, these times can serve
as a benchmark estimate for the performance of a system and
determine if the system will be performing at an acceptable level.

System Delays
System delays include input filters, System Delays: Factors that impede or impact the maximum input
transmission delay, switch latency, and or output times associated with CIP connections.
queue delays; these will be discussed in
greater detail later in the lesson.
The principal types of delays are identified in the following table:
Delay Description
Discrete input modules have filters. There are no filters for outputs, so
Input filter there is no additional delay for outputs. Outputs are always sent using an
RPI timer.
The transmission delay is the interval of time that it takes a packet to be
Transmission transmitted at a specific bit rate (e.g. 100Mbps).
transmission delay = 0.01 ms x (number of CIP connections)
Switch latency is the delay between reception of the first bit and
transmission of the first bit. This delay depends on the type of switch. It is
Switch
typically 0.1 ms.
switch delay = 0.1 ms
Input data is sent from the remote rack (adapter), through a switch,
through a communication module in the controller rack, and finally to a
controller (scanner). If two or more input CIP connections are
Queue
simultaneously ready to be transmitted, they must be transmitted
sequentially.
queue delay = 1/PPS x (number of CIP connections)

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
maxib300
2--8 Optimizing an EtherNet/IP Network

HMI Nominal System Limitations

There are system limits on the maximum number of HMI terminals


communicating to a processor or controller over a EtherNet/IP
network:

RSViewr Machine Editiont Software Configurations


PanelView Plus
RSView Machine PanelView Plus
Extended PanelView Plus 400-600
Edition Software 700-1500 Terminals
Memory/VersaView CE Terminals
Configurations With Standard Memory
700H-1500H Terminals
Display basic objects 1-2 sec. <1 sec. 1-2 sec.
Display extended
2-4 sec. 1-2 sec. 2-4 sec.
objects*
Number of displays 80 50 50
Controller tags 1,300 250 250
Alarm messages 5,000 950 950
Bitmaps 2.75 MB 1.4 MB 1.4 MB

*Extended objects include embedded variables, macros, and


expressions.

Based on the RSView Machine Edition software configurations


above, use this table to estimate the number of terminals that can
Point out the terminal connections for connect to a controller or processor over an EtherNet/IP network and
ControlLogix controllers. stay within the memory of the terminal:

Maximum Number
Terminal Type Controller/Processor
of Terminals*
PanelView Plus with extended
ControlLogixt 10
memory/VersaView CE 700H-1500H terminals
MicroLogixt 2
PanelView Plus 700-1500
700 1500 terminals with SLCt 500 7
standard memoryy CompactLogixt 3
ControlLogixr 14
MicroLogix 2
SLC 10
PanelView Plus 400-600
400 600 terminals
CompactLogix 3
ControlLogix 6

*Values are based on no other devices on the network or integrated


motion.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
maxib300
Optimizing an EtherNet/IP Network 2--9

Alternative Modules and Connection Strategies

In the course of determining your system bandwidth requirements


and the maximum input and output times, you may find that the
system is not going to perform as anticipated. The following
strategies may assist you in improving your EtherNet/IP network
throughput:
• Increase some RPIs to allow others RPIs in the system to
decrease.
• Change connection types (e.g., direct to rack-optimized).
• Change I/O module configurations (e.g., filter times, triggers
types).
• Add additional EtherNet/IP modules.
• Add Logix controllers.
• Select I/O modules that operate at faster data rates.
• Verify that the network infrastructure can handle the system
traffic.
• Verify that the Ethernet switches support full-duplex operation
and IGMP snooping. Port-mirroring is also important for Ethernet
switch and system diagnostics.

Here’s How To perform the following tasks:


Inform the students that the worksheet • Determine the total number of CIP connections on a network
for these examples is a template. They
will need to adjust it to their own system • Determine system bandwidth requirements
needs (e.g., if two racks are optimized at • Predict maximum input and output times for for CIP connections
two different RPIs, they will need to do
two rack optimized calculations and • Determine system bandwidth requirements
include both into the total number of
packets per second). • Identify alternative module and connection strategies
Tell the students that they can use a As your instructor demonstrates these procedures using the following
spreadsheet to automate this process.
examples, follow along in the associated job aid(s).

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
maxib300
2--10 Optimizing an EtherNet/IP Network

Example Determining the Total Number of CIP Connections for an


EtherNet/IP Network

A 1756-L63 ControlLogixr controller is controlling six I/O modules


(four digital and two analog modules) in a remote chassis (through
common 1756-ENBT modules):

Answer: Six CIP connections. • Determine the number of CIP connections if the modules in the
remote rack are not rack-optimized.
Answer: Three CIP connections. • Determine the number of CIP connections if the modules in the
remote rack are listen-only rack-optimized.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
maxib300
Optimizing an EtherNet/IP Network 2--11

Example Determining System Bandwidth Requirements and CIP


Use the MAX_300_DEM1_10_4.xls file Connections for an EtherNet/IP Network
assist you in calculating the bandwidth
requirements and maximum input/output A 1756-ENBT module has direct connections to three EtherNet/IP
times.
adapter modules (#6, #7, and #8) with each I/O module operating at
Upon completing the Bandwidth
Allocation worksheet, you should have an RPI and RTS of 10 ms. It has no produced or consumed tags:
determined that the system requires • Determine if there is sufficient bandwidth for this system.
4800 pps (i.e., 24@10). There is
sufficient bandwidth available for this • Estimate the maximum input or output times for this system.
system; however, it does not reserve • Make some recommendations to better optimize the system.
10% of the bandwidth for explicit
messaging.
Tip " Watch the units. RPIs are calculated in ms while packets/second are
Without system delays, the worst calculated in seconds (i.e., 1 ms = 0.001 sec).
case scenario would be 2*RTS (equal to
the RPI) for a non-isolated analog
module; therefore the maximum
input/output time is 20 ms.
With system delays, the worst case
scenario would be 22 ms (i.e.,
2*10+1+0.01*9+0.1+.2*9) if each analog
module used was a non-isolated analog
module. Since this is more than twice
the value of the RPI, some measures
need to be taken to optimize the system.
To better optimize the system: employ
rack optimization and/or slow the RPI
rate down.
EtherNet/IP EtherNet/IP EtherNet/IP
Module #1 Module #2 Module #3

Main Controller Controller #2 Controller #3


(Consumer) (Consumer)
Workstation with
RSView Software Switch

To Company Intranet

EtherNet/IP EtherNet/IP
PanelViewt
Module #5 Module #7
Plus Terminal

EtherNet/IP EtherNet/IP EtherNet/IP


Module #4 Module #6 Module #8
3 Analog 3 Analog
5 Digital 5 Digital

3 Analog 3 Analog 3 Analog


5 Digital 5 Digital 5 Digital

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
maxib300
2--12 Optimizing an EtherNet/IP Network

Bandwidth Allocation

EtherNet/IP Module ID:

Rack Optimized Connections:


2 × Connections
RPI

Direct Connections:
2 × Connections
RPI

Produced Tags:
1 + Produced Tags
RPI

Consumed Tags:
2 × Consumed Tags
RPI

Total Packets/Second:

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
maxib300
Optimizing an EtherNet/IP Network 2--13

Maximum Input/Output Times Without System Delays

Rack Optimized Connections:


1 × RPI

Direct Connections

Digital Module(s):
1 × RPI

Non-Isolated Analog Module(s):


2 × RTS

Isolated Analog Module(s):


1 × RTS

Produced/Consumed Tags:
1 × RPI

Note: This worksheet calculates delays for individual modules, not a cumulative total of all delays.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
maxib300
2--14 Optimizing an EtherNet/IP Network

Maximum Input/Output Times With System Delays

Rack Optimized Connections:


1 × RPI + Input Filter + Transmission + Switch + Queue

Direct Connections

Digital Module(s):
1 × RPI + Input Filter + Transmission + Switch + Queue

Non-Isolated Analog Module(s):


2 × RTS + Transmission + Switch + Queue

Isolated Analog Module(s):


1 × RTS + Transmission + Switch + Queue

Produced/Consumed Tags:
1 × RPI + Transmission + Switch + Queue

Note: This worksheet calculates delays for individual modules, not a cumulative total of all delays.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
maxib300
Optimizing an EtherNet/IP Network 2--15

Example Determining HMI Nominal System Limitations

Based on the RSView Machine Edition software configuration


Tell the students to use the HMI Nominal below, how many PanelView Plus 700 terminals with standard
System Limitations table. The answer is memory can be connected to a CompactLogix controller over an
3.
EtherNet/IP network?
• Display basic objects: 1-2 sec.
• Display extended objects: 2-4 sec.
• Number of displays: 80
• Controller tags: 1,300
• Alarm messages: 5,000
• Bitmaps: 2.75 MB

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
maxib300
2--16 Optimizing an EtherNet/IP Network

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
maxib300
Exercise: Optimizing an EtherNet/IP Network 2--17

Exercise: Optimizing an
EtherNet/IP Network

Exercise A In this exercise, you will practice the following tasks:


• Determine the total number of CIP connections on a network
• Determine system bandwidth requirements
• Determine HMI nominal system limitations
• Identify alternative module and connection strategies
Context:

As the company’s system designer, you have been asked to see if a


ControlLogixr controller with a remote 1756-ENET module
controlling three I/O modules in its chassis has sufficient bandwidth
to operate the project it is controlling. Two modules operate at an
RPI of 5 ms and the third module operates at an RPI of 10 ms.

For help performing steps in this exercise, see the associated job
aid(s).

Directions:

1. Open the MAX_CCP174_x1.xls file.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
maxe300
2--18 Exercise: Optimizing an EtherNet/IP Network

2. Calculate the bandwidth requirements for this system:

Tip " Watch the units. RPIs are calculated in ms while packets/second are
calculated in seconds (i.e., 1 ms = 0.001 sec).

Bandwidth Allocation

EtherNet/IP Module ID: EtherNet/IP Module A1

Rack Optimized Connections:


2 × Connections
RPI

Direct Connections:
2 × Connections
RPI

Produced Tags:
1 + Produced Tags
RPI

Consumed Tags:
2 × Consumed Tags
RPI

Total Packets/Second:

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
maxe300
Exercise: Optimizing an EtherNet/IP Network 2--19

3. Is there sufficient bandwidth for the system to operate efficiently?

4. What recommendations, if any, can you make to improve the


system?

5. Based on the RSViewr Machine Editiont software


configurations below, how many PanelView Plus 400-600
terminals can be connected to a ControlLogix controller over an
EtherNet/IP network?
RSView Machine Edition software configurations:
• Display basic objects: 1-2 sec.
• Display extended objects: 2-4 sec.
• Number of displays: 50
• Controller tags: 250
• Alarm messages: 950
• Bitmaps: 1.4 MB

How Did You Do? Turn to the Answers section.

Exercise B In this exercise, you will practice the following tasks:


• Determine the total number of CIP connections on a network
• Determine system bandwidth requirements
• Identify alternative module and connection strategies
Context:

As the company’s system designer, you have been tasked to see if a


ControlLogix controller with a 1756-ENBT module interfacing with
45 AENT adapter modules in its chassis has sufficient bandwidth to
operate the project it is controlling. The AENT modules operate at an
RPI of 20 ms.

For help performing steps in this exercise, see the associated job
aid(s).
Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
maxe300
2--20 Exercise: Optimizing an EtherNet/IP Network

Directions:

1. Open the MAX_CCP174_x1.xls file.


2. Calculate the bandwidth requirements for this system:

Tip " Watch the units. RPIs are calculated in ms while packets/second are
calculated in seconds (i.e., 1 ms = 0.001 sec).

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
maxe300
Exercise: Optimizing an EtherNet/IP Network 2--21

Bandwidth Allocation

EtherNet/IP Module ID: EtherNet/IP Module B1

Rack Optimized Connections:


2 × Connections
RPI

Direct Connections:
2 × Connections
RPI

Produced Tags:
1 + Produced Tags
RPI

Consumed Tags:
2 × Consumed Tags
RPI

Total Packets/Second:

3. Is there sufficient bandwidth for the system to operate efficiently?

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
maxe300
2--22 Exercise: Optimizing an EtherNet/IP Network

4. What recommendations, if any are warranted, can you make to


improve the system?

How Did You Do? Turn to the Answers section.

Exercise C In this exercise, you will practice the following tasks:


• Determine the total number of CIP connections on a network
• Determine system bandwidth requirements
• Predict maximum input and output times for CIP connections
Context:

You have been recently hired as the company’s system designer. The
plant’s EtherNet/IP network and the modules used in the production
line are displayed in the following schematic:

EtherNet/IP EtherNet/IP EtherNet/IP


Module #1 Module #2 Module #3
Workstation with
RSView Software

Main Controller Controller #2 Controller #3


(6 Produced Tags) (3 Consumed Tags) (3 Consumed Tags)

Switch

To Company Intranet

EtherNet/IP EtherNet/IP
PanelViewt
Module #7 Module #8
Plus Terminal

EtherNet/IP EtherNet/IP EtherNet/IP


Module #4 2 Analog (2 @ 30 ms) Module #6 3 Analog (1 @ 30 ms, 2 @ 50ms) Module #5
6 Digital (2 @ 25 ms, 4 @ 10 ms) 5 Digital (3 @ 25 ms, 2 @ 20 ms)

4 Analog (50 ms) 2 Analog (40 ms) 8 Digital (4 @ 25 ms,


4 Digital (1 @ 25 ms, 6 Digital (1 @ 25 ms, 4 @ 20 ms)
1 @ 20 ms, 2 @ 10 ms) 2 @ 20 ms, 3 @ 10 ms)

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
maxe300
Exercise: Optimizing an EtherNet/IP Network 2--23

The EtherNet/IP Module #1 in the chassis with the main controller is


the most loaded EtherNet/IP module. In addition to explicit
messaging, it must communicate with:
• Five specified I/O racks
• A PanelView terminal
• An RSView workstation
• Two controllers that use two distinct produced tags
As the company’s new system designer, you need to determine the
amount of bandwidth being used on this network and the maximum
input and output times (including system delays) that the various CIP
connections are using.

In addition to the information contained on the schematic, the


following information has been provided to you by your staff:

Network Component Description


EtherNet/IP module 1756-ENBT module
Controllers #1 -- #3 1756-L63 controllers
Chassis #4 - #8 Distributed I/O (i.e., no controllers present in the chassis)
Analog modules 6 Isolated (50 ms); 5 Non-Isolated (2 @ 40 ms, 3 @ 30 ms)
Digital modules 11 (25 ms); 9 (10 ms); 9 (20 ms)
One direct connection to an array of 40 tags at 100 ms
PanelView Plus terminal
One explicit connection to an array of 100 tags at 300 ms
Four tags consume data at 50 ms
Produce/Consume tags
Two tags consume data at 20 ms
RSView workstation Explicit messaging of an array of 1500 tags at 300 ms
Input filter Input delay = 1 ms
Managed switch Switch delay = 0.1 ms

For help performing steps in this exercise, see the associated job
aid(s).

Directions:

1. Open the MAX_CCP174_x1.xls file.


2. Calculate the bandwidth requirements for this system:

Tip " Watch the units. RPIs are calculated in ms while packets/second are
calculated in seconds (i.e., 1 ms = 0.001 sec).

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
maxe300
2--24 Exercise: Optimizing an EtherNet/IP Network

Bandwidth Allocation

EtherNet/IP Module ID: EtherNet/IP Module C1

Rack Optimized Connections:


2 × Connections
RPI

Direct Connections:
2 × Connections
RPI

Produced Tags:
1 + Produced Tags
RPI

Consumed Tags:
2 × Consumed Tags
RPI

Total Packets/Second:

3. Is there sufficient bandwidth for the system to operate efficiently?

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
maxe300
Exercise: Optimizing an EtherNet/IP Network 2--25

4. Calculate the maximum input/output times (with system delays)


for the CIP connections on the network:

Tip " Watch the units. RPIs are calculated in ms while packets/second are
calculated in seconds (i.e., 1 ms = 0.001 sec).

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
maxe300
2--26 Exercise: Optimizing an EtherNet/IP Network

Maximum Input/Output Times With System Delays

Rack Optimized Connections:


1 × RPI + Input Filter + Transmission + Switch + Queue

Direct Connections

Digital Module(s):
1 × RPI + Input Filter + Transmission + Switch + Queue

Non-Isolated Analog Module(s):


2 × RTS + Transmission + Switch + Queue

Isolated Analog Module(s):


1 × RTS + Transmission + Switch + Queue

Produced/Consumed Tags:
1 × RPI + Transmission + Switch + Queue

Note: This worksheet calculates delays for individual modules, not a cumulative total of all delays.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
maxe300
Exercise: Optimizing an EtherNet/IP Network 2--27

How Did You Do? Turn to the Answers section.

Exercise D In this exercise, you will practice the following tasks:


• Determine the total number of CIP connections on a network
• Identify alternative module and connection strategies
• Determine system bandwidth requirements
Context:

Having identified in the previous exercise the bandwidth usage of


your plant’s EtherNet/IP network, you decide to develop a new
connection strategy that will reduce the amount of bandwidth
currently being used. In employing a new strategy to minimize
bandwidth while maximizing throughput; you must adhere to the
following restrictions:
• Each chassis that is used on the plant floor must be a 10-slot
chassis (open slots are permitted).
• Each chassis must house a 1756-ENBT EtherNet/IP module.
• Chassis 1 to 3 must all house the controllers used in the project.
• Produce/consume tags (4 tags consume data at 50 ms and 2 tags
consume data at 20 ms.
• Each of the existing modules, terminals, and workstations must
be used in the new configuration.
• Each implicit connection must use an RPI in the following range:
-- Minimum: 10 ms
-- Maximum: 100 ms
For help performing steps in this exercise, see the associated job
aid(s).

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
maxe300
2--28 Exercise: Optimizing an EtherNet/IP Network

Directions:

1. With the existing system below, change all digital connections to


rack optimization and observe the effect on bandwidth:
EtherNet/IP EtherNet/IP EtherNet/IP
Module #1 Module #2 Module #3
Workstation with
RSView Software

Main Controller Controller #2 Controller #3


(6 Produced Tags) (3 Consumed Tags) (3 Consumed Tags)

Switch

To Company Intranet

EtherNet/IP EtherNet/IP
PanelViewt
Module #7 Module #8
Plus Terminal

EtherNet/IP EtherNet/IP EtherNet/IP


Module #4 2 Analog (2 @ 30 ms) Module #6 3 Analog (1 @ 30 ms, 2 @ 50ms) Module #5
6 Digital (2 @ 25 ms, 4 @ 10 ms) 5 Digital (3 @ 25 ms, 2 @ 20 ms)

4 Analog (50 ms) 2 Analog (40 ms) 8 Digital (4 @ 25 ms,


4 Digital (1 @ 25 ms, 6 Digital (1 @ 25 ms, 4 @ 20 ms)
1 @ 20 ms, 2 @ 10 ms) 2 @ 20 ms, 3 @ 10 ms)

2. Open the MAX_CCP174_xl.xls file.


3. Calculate the bandwidth requirements for your system:

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
maxe300
Exercise: Optimizing an EtherNet/IP Network 2--29

Tip " Watch the units. RPIs are calculated in ms while packets/second are
calculated in seconds (i.e., 1 ms = 0.001 sec).

Bandwidth Allocation

EtherNet/IP Module ID: EtherNet/IP Module D1

Rack Optimized Connections:


2 × Connections
RPI

Direct Connections:
2 × Connections
RPI

Produced Tags:
1 + Produced Tags
RPI

Consumed Tags:
2 × Consumed Tags
RPI

Total Packets/Second:

How Did You Do? Turn to the Answers section.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
maxe300
2--30 Exercise: Optimizing an EtherNet/IP Network

Answers Exercise A

1. This system requires a bandwidth of 1000 pps (as calculated in


the following worksheet):

Bandwidth Allocation

EtherNet/IP Module ID: EtherNet/IP Module A1

Rack Optimized Connections: 0


2 × Connections
RPI


1000 i.e., 1000 = 2 ×
10
1+2×2
1000
5
1000

Direct Connections:
2 × Connections
RPI

Produced Tags: 0

1 + Produced Tags
RPI

Consumed Tags: 0

2 × Consumed Tags
RPI

Total Packets/Second: 1000

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
maxe300
Exercise: Optimizing an EtherNet/IP Network 2--31

3. No. The maximum allowable bandwidth for a 1756-ENET


module is 900 pps.
4. Use a 1756-ENBT module and/or use rack-optimization with an
RPI ≥ 7 ms.
5. Six PanelView Plus 400-600 terminals (based on the RSView
Machine Edition software configurations) can be connected to a
ControlLogix controller over an EtherNet/IP network.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
maxe300
2--32 Exercise: Optimizing an EtherNet/IP Network

Exercise B

1. This system requires a bandwidth of 4500 pps (as calculated in


the following worksheet):

Bandwidth Allocation

EtherNet/IP Module ID: EtherNet/IP Module B1

Rack Optimized Connections: 0


2 × Connections
RPI


4500 i.e., 4500 = 2 ×
20
45
1000

Direct Connections:
2 × Connections
RPI

Produced Tags: 0

1 + Produced Tags
RPI

Consumed Tags: 0

2 × Consumed Tags
RPI

Total Packets/Second: 4500

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
maxe300
Exercise: Optimizing an EtherNet/IP Network 2--33

3. Yes and no. The bandwidth used will be on the edge of the
maximum allowable bandwidth for implicit connections. The
amount of explicit messaging the 1756-ENBT module will be
handling will (should) impact your decision.
4. If possible, split the communications load between two (or
more) modules.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
maxe300
2--34 Exercise: Optimizing an EtherNet/IP Network

Exercise C

1. This system requires a bandwidth of 4750 pps (as calculated in


the following worksheet):

Bandwidth Allocation

EtherNet/IP Module ID: EtherNet/IP Module C1

Rack Optimized Connections: 0


2 × Connections All digital I/O modules have
RPI RPIs in the specifications.

4140
Direct Connections:
2 × Connections Connections RPI Packets/Sec.
RPI Digital: 9 10 1800
9 20 900
11 25 880
Analog: 3 30 200
2 40 100
6 50 240
PanelView:1 100 20
Produced Tags: 250

1 + Produced Tags
RPI

Consumed Tags: 360


2 × Consumed Tags
RPI

Total Packets/Second: 4750

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
maxe300
Exercise: Optimizing an EtherNet/IP Network 2--35

3. No. The bandwidth usage by implicit connections exceeds 90%


of the total available bandwidth. Given the amount of explicit
messaging to be processed, alternative connection strategies
should be employed.
4. The worst-case, maximum input or output times for this system
are not significantly higher than the established RPI values. If
these times are too slow, operating at a faster data rate and/or
rack optimization will reduce the times (however faster RPI
rates will increase the amount of bandwidth used by the
network).

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
maxe300
2--36 Exercise: Optimizing an EtherNet/IP Network

Maximum Input/Output Times With System Delays

0
Rack Optimized Connections:
1 × RPI + Input Filter + Transmission + Switch + Queue

Direct Connections

Digital Module(s): Input: 9 @ 20 = 23 ms


1 × RPI + Input Filter + Transmission + Switch + Queue
Input: 9 @ 10 = 13 ms

Output: 11 @ 25 = 27.4 ms

Non-Isolated Analog Module(s): 2 @ 40 = 80.5 ms

2 × RTS + Transmission + Switch + Queue


3 @ 30 = 60.7 ms

6 @ 50 = 51.4 ms
Isolated Analog Module(s):
1 × RTS + Transmission + Switch + Queue

Produced/Consumed Tags: 4 @ 50 = 51 ms

1 × RPI + Transmission + Switch + Queue


2 @ 20 = 20.5 ms

Note: This worksheet calculates delays for individual modules, not a cumulative total of all delays.
Note: For help with understanding transmission, switch, and queue information, see the delay types chart.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
maxe300
Exercise: Optimizing an EtherNet/IP Network 2--37

Exercise D

1. The optimal bandwidth for this system is 1970 pps (as


calculated in the following worksheet):

Bandwidth Allocation

EtherNet/IP Module ID: EtherNet/IP Module D1

Rack Optimized Connections: 800


2 × Connections All digital I/O in chassis 4, 6,
RPI and 7 are at 10 ms.
3 @ 10 ms = 600 packets/sec
All digital I/O in chassis 5
2 @ 20 ms = 200 packets/sec and 8 are at 20 ms.

Direct Connections: 560

2 × Connections Connections RPI Packets/Sec.


RPI Analog: 3 30 200
2 40 100
6 50 240

PanelView: 1 100 20

Produced Tags: 250


1 + Produced Tags
RPI

Consumed Tags: 360


2 × Consumed Tags
RPI

Total Packets/Second: 1970

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
maxe300
2--38 Exercise: Optimizing an EtherNet/IP Network

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
maxe300
Lesson 3
Pinging a Module’s EtherNet/IP
Address

What You Will Learn After completing this lesson, you should be able to:
• Identify the class of an IP address
• Identify if two EtherNet/IP devices are on the same subnet
• Ping an Ethernet IP address

Why These Skills Are Important

Being able to identify if two EtherNet/IP devices are on the same


subnet allows you to determine whether these devices are
communicating directly with one another or are communicating
through a router. Properly pinging an IP address allows you to isolate
network hardware problems and incompatible configurations.

Before You Begin Overview of IP Addresses

IP (Internet Protocol) Address: A user-defined software address


Let the students know that their will be a assigned to a device on an Ethernet network that identifies the
brief discussion on private IP addresses network and the node. An IP address is a 32-bit address that is
later in this lesson.
normally grouped into 4 bytes for ease of communication and
understanding (e.g., 10.88.244.130).

Each IP address is separated internally into two parts:


Explain that network ID is also known as • Network ID: Identifies a single network segment within a larger
a network address. TCP/IP internetwork (a network of networks).
Explain that host ID is also known as a • Host ID: Identifies a TCP/IP node within each network. The host
host address. ID for each device identifies a single system uniquely within its
own network.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
pdiib300
3--2 Pinging a Module’s EtherNet/IP Address

The following graphic shows a sample view of an IP address


(131.107.16.200) as it is divided into network and host ID sections.

Tell the students that every Rockwell MAC (Media Access Control) Address: A static address that is
Automation/Allen-Bradley factory-assigned to an Ethernet and/or EtherNet/IP device. This
Ethernet/EtherNet/IP product has a MAC
address in the form address is a unique 6-byte address -- each digit is a hex number -- that
00:00:BC:XX:XX:XX. is embedded in the circuitry of every device that is on an EtherNet/IP
Inform the students that a device’s MAC network:
address is also referred to as the
device’s Hardware Address or Ethernet
Address.

? How many possible Ethernet MAC Address (also referred to


devices/components can Rockwell
Automation manufacture? as a module’s Ethernet address)
Answer: 166 (=16,777,216).

Public IP addresses need to be purchased. If you


need to obtain an IP address for your company,
contact an IP registry. ICANN (Internet
Corporation for Assigned Names and Numbers) is
the private (non-government) non-profit
corporation responsible for IP address space
allocation, protocol parameter assignment, domain
name system management, and root server system
management functions.

IP addresses are easy-to-use and remember notations for the user to


employ in communication networks:
• Devices use their hardware addresses to communicate with each
other.
• Each device converts its hardware address to an IP address before
it transmits a message on the network.
• As devices communicate with each other, they store information
in their memory that identifies a hardware device with its IP
address.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
pdiib300
Pinging a Module’s EtherNet/IP Address 3--3

Ethernet networks support many different types of protocols,


including TCP/IP:
• TCP/IP is not limited to an EtherNet/IP network.
• EtherNet/IP addresses are used to communicate between devices
on different protocols.
• The different protocols that devices use to communicate on are
transparent to the user at the network layer of the OSI model.
Domain Name: A text-based address that is equivalent to the IP
address of the module. A DNS server can convert the text-based
address into an IP address.

DNS (Domain Name System): A method of organizing name space


on the Internet by grouping hosts into a hierarchy of authority that
allows addressing and other information to be widely distributed and
maintained. One advantage of this system is that using it eliminates
dependence on a centrally-maintained file that maps host names to IP
addresses.

Explain that if a message uses a host Primary/Secondary DNS Server Address: Allows a server to
name address, it must be converted to accept a “text-based” address and perform a database lookup to
an IP address before it can be sent to
the destination controller. When the convert it to an IP address to be used by the network.
EtherNet/IP module of the sending
controller has a DNS server address
configured, the DNS server takes the
host name address and converts it to the Classes of IP Addresses
IP address of the destination
EtherNet/IP module and the message There are four different classes of IP addresses. The IP address used
can be sent. by an organization determines the number of possible networks and
.There is a fifth class, E, of IP addresses end devices that they can have. The classes are determined by the
that uses the initial byte addresses from first few bits of each IP address:
240 to 248. These addresses are not
used and are reserved for experimental 0 1 2 8 16 24 31
purposes.
Class A 0 Net ID Host ID
Explain that as the number
of nodes
decreases/increases,
the number of networks Class B 1 0 Net ID Host ID
increases/decreases.

Class C 1 1 0 Net ID Host ID

Class D Used for Multicast Messages

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
pdiib300
3--4 Pinging a Module’s EtherNet/IP Address

The classes of IP addresses are summarized in the following table:

Class Initial Byte Values Typical Users/Uses


A 1 -- 127 Very large networks
B 128 -- 191 Medium-sized networks
Small to mid--size
C 192 -- 223
businesses
D 224 -- 239 Multicast messaging

Inform students that they should obtain a Private IP Addresses


list of available private IP addresses
from their IT department before There are a finite number of IP addresses that have been designated
randomly using one. The ability to reuse as private IP addresses. The private IP addresses prohibit message
an IP number extends between different
enterprises but not necessarily within a traffic from being routed to the Internet thereby avoiding conflicts
subnet. that would otherwise arise whenever two or more enterprises used
the same IP address:

Class Private IP Addresses


A 10.0.0.0 -- 10.255.255.255
B 172.16.0.0 -- 172.31.255.255
C 192.168.0.0 -- 192.168.255.255

The advantages of using private IP addresses include:


• Readily available for anyone to use at anytime (i.e., you do not
need to register these addresses or obtain approval from an
Internet registry prior to implementing them)
• Simultaneous usage by multiple companies thereby allowing
users to create their own private network
• Easily expandable number of networks and end devices a user can
employ (thereby addressing the concern of having an insufficient
number of IP addresses)

These benefits, though not Benefits of Using an IP Address


all-encompassing, identify the major
advantages IP addresses have over EtherNet/IP devices generally have two addresses associated with
their MAC address counterparts. them: the MAC address (assigned by the manufacturer) and the IP
address (generally assigned by the user). There are several
advantages to using the IP address over the MAC address:
• Easier to use and remember
Mention that DHCP assignments of IP • User configurable
addresses are not technically assigned
by a user but rather obtained from a • Modifiable
DHCP server. • Unique, yet reusable
Explain that each IP address is unique in • Ability for messages to be routed between multiple networks
the world and they need to be obtained
from an approved registry. IP addresses • Simplified communications between TCP/IP nodes (since they
are reusable since they can be communicate on the network layer)
repeatedly used within subnets or
private networks.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
pdiib300
Pinging a Module’s EtherNet/IP Address 3--5

Inform the students that they will be Subnets and Subnet Masks
shown how to identify if two devices are
on the same network later in this lesson. Subnet Mask: An address that enables distinction between networks
This section may confuse your students. by “masking” IP address bits that denote the same network and
Network administrators are often
stymied by this topic. “exposing” bits that denote different networks:
Since this topic is vast and perplexing, • Networks are often divided up into smaller units called subnets.
present the material, add some • Network administrators create subnets as a management tool:
additional information if warranted, and
then assist the students as they work -- Routes packets to the appropriate subnetwork based on IP
through the examples and exercises. addresses
If there is some time at the end of the -- Easier to monitor the health of the entire network
course, you could use it to further
discuss this topic. -- Minimizes effort required to troubleshoot and isolate problems
-- Capable of isolating users based on:
If pressed for additional information,
refer them to the Internet. Entering the -- Geography
terms subnet or subnet mask into their -- Departments
favorite search engine will reward them
with a plethora of information. The -- Media protocols
search results will provide them -- Communication needs (e.g., plant floor I/O vs office
background information, subnet
calculators, and web and classroom email).
learning opportunities. • Plant environment communications benefit when plant floor
communications operate on a separate subnet from the office
communications:
-- Accommodates timeliness of operations
-- Enhances system maintenance and upgrade options
-- Adds levels of security.
? How would using subnets on a plant Subnet masks allow for two devices to determine whether or not they
floor assist your company’s operations? exist on the same subnet:
Answer: Subnets would make it • If two devices are on the same subnet, they are able to
possible to isolate different plant floor communicate directly with one another.
operations (e.g., welding, milling) from
each other and from the • If two devices are on different subnets, the data must first be sent
office/administrative systems. This to a router before the targeted device receives the data sent by the
allows one operation to be shut down
without directly impacting the whole source device.
plant. Subnets will reduce the risk of
security threats (e.g., Trojan horse
attacks). How a Subnet Mask Operates
A subnet mask, like an IP address, is a 32-bit address that is
? How many of you have ever normally grouped into 4 bytes for ease of communication and
programmed an MVM instruction? How understanding:
does it work?
Inform the students that a subnet mask Typical Subnet Mask
operates in a manner similar to an MVM
instruction; hopefully they will be able to 255.255.XXX.XXX
translate some of that familiarity when
identifying if two IP addresses are on the
same subnet.
Binary Equivalent: 1 1 1 1 1 1 1 1 . 1 1 1 1 1 1 1 1 . x x x x x x x x . x x x x x x x x
Consecutive “1’s” Represent Network Portion of IP Address

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
pdiib300
3--6 Pinging a Module’s EtherNet/IP Address

A subnet mask uses the “1’s” to do a bit-by-bit comparison of two IP


addresses to see if the devices associated with the IP address are on
the same subnet:
• As long as the IP address bits match each other (independent of
the subnet mask value) whenever there is a corresponding “1” in
the subnet mask, the devices are on the same subnet.
• If the network portions:
-- Match up, the devices communicate directly with each other.
-- Don’t match up, they are on separate networks and then
communicate through a router (commonly referred to as a
gateway).

Example
Compare the EtherNet/IP addresses of two devices and determine
if they are on the same subnet:
EtherNet/IP Address: 165.88.73.129
EtherNet/IP Address: 165.88.74.187
Subnet Mask: 255.255.240.0

Converting these decimal values to their binary equivalent yields:

EtherNet/IP Address: 1 0 1 0 0 1 0 1 . 0 1 0 1 1 0 0 0 . 0 1 0 0 1 0 0 1 . 1 0 0 0 0 0 0 1
EtherNet/IP Address: 1 0 1 0 0 1 0 1 . 0 1 0 1 1 0 0 0 . 0 1 0 0 1 0 1 0 . 1 0 1 1 1 0 1 1
Subnet Mask: 11111111.11111111.11110000.00000000

Corresponding bits match


each other; therefore,
these two devices are on
the same subnet.

Compare the same two EtherNet/IP addresses of two devices


using a different subnet mask and determine if they are on the
same subnet:
EtherNet/IP Address: 165.88.73.129
EtherNet/IP Address: 165.88.74.187
Subnet Mask: 255.255.255.0

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
pdiib300
Pinging a Module’s EtherNet/IP Address 3--7

Converting these decimal values to their binary equivalent yields:

EtherNet/IP Address: 1 0 1 0 0 1 0 1 . 0 1 0 1 1 0 0 0 . 0 1 0 0 1 0 0 1 . 1 0 0 0 0 0 0 1
EtherNet/IP Address: 1 0 1 0 0 1 0 1 . 0 1 0 1 1 0 0 0 . 0 1 0 0 1 0 1 0 . 1 0 1 1 1 0 1 1
Subnet Mask: 11111111.11111111.11111111.00000000

Corresponding bits do not match each other; therefore,


these two devices are not on the same subnet.

? What are some reasons you may As demonstrated by these examples, it is possible to expand (or
want to expand your network? Contract contract) the network environment by changing the subnet masks
it? associated with the devices on a network.
Answer: Isolate devices, processes,
and enhance security. Limiting the
number of subnets you have increases Gateways
the likelihood that two devices can Gateways: Nodes on a network that act as entrance and exit portals
communicate directly with each other.
This may reduce the number of routers between external networks:
you must purchase, maintain, and • Data packets being shared between internal and external devices
monitor.
Gateways are glorified routers that must pass-through at least one gateway in establishing
control the flow of data between external communications.
networks and an enterprise’s internal
network. • Gateways often act as a firewall and protect the resources of a
private network from users from other networks.
• Gateways may have more than one IP address associated with
them -- one for internal users and one for external users.
Default Gateway: The router (gateway) to which all remote packets
must be sent in order to be routed to their final destination (i.e., if
two devices are not on the same network, the packet will be sent to
the gateway).

Gateway Address: The IP address of a device’s default gateway.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
pdiib300
3--8 Pinging a Module’s EtherNet/IP Address

Data Flow
Data generated by a source device will travel to its destination device
across an EtherNet/IP network using either a direct route or an
indirect route. The path a packet of data takes is transparent to the
user and the data may have to traverse through several routers before
arriving at its final destination:

Source Device

Devices in the No
same IP class?

Yes
R
O
Devices in the No U
same network? T
E
R
Yes

Devices in the No
same subnet?

Yes

Destination
Device

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
pdiib300
Pinging a Module’s EtherNet/IP Address 3--9

It is often believed that ”Ping” is an Ping


abbreviation for Packet Internet Groper,
but Ping’s author has stated that the The ping command is a very common method for troubleshooting
names comes from the sound that a
sonar makes. the accessibility of devices. It uses a series of Internet Control
Message Protocol (ICMP) Echo messages to determine:
• Whether a remote host is active or inactive.
• The round--trip delay in communicating with the host.
• Packet loss.
The ping command first sends an echo request packet to an address,
then waits for a reply. The ping is successful only if:
• The echo request gets to the destination.
• The destination is able to get an echo reply back to the source
within a predetermined time called a timeout.

Ping Command

Device Is Active
on the Network

Device Is Not
Active on the
Network

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
pdiib300
3--10 Pinging a Module’s EtherNet/IP Address

Tell the students that if they know the Successful (ping) returns are an indication that:
module’s MAC address, following up the
ping command with the arp command • A device is active on the network with the IP address used by the
will help determine if the active device is ping command.
the one they are seeking.
A successful ping command does not guarantee
that a particular device is active. A successful ping
identifies that a device with the identified IP
address is active on the network.

• The error is not caused by a faulty cable.


• The error is not the result of a problem with the router or switch.
An unsuccessful (ping) return is an indication that a device with the
IP address used by the ping command is not active on the network.
This can be an indication that:
• There is no device active on the network with the IP address used
by the ping command.
• There is a faulty or loose cable connected to the device.
• The module may not be properly seated (e.g., 1756-ENBT
module not completely inserted into its rack).
• A duplicate IP address assignment may exist.
• The module may be faulty.
• There is a problem with the router or switch.

ARP (Address Resolution Protocol)


Inform the students that it may be The arp (arp --a) command is a protocol for mapping an Internet
possible to identify who manufactured a Protocol address (IP address) to a MAC address that is recognized in
particular device based on the first three
octets (i.e., the OUI (Organizationally the local network. To be most effective in mapping the two different
Unique Identifier)) of a device’s MAC addresses together, it should be executed after the ping command has
address. been executed on one or more IP addresses.
The IEEE maintains a list of OUIs at the
following link:
http://standards/ieee.org/regauth/oui/ind
ex.shtml

IP and MAC address


pairing list

If a device’s MAC address is known, the arp command when used in


conjunction with the ping command can determine if the device has
the appropriate IP address assigned to it.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
pdiib300
Pinging a Module’s EtherNet/IP Address 3--11

Here’s How To perform the following tasks:


1. Write an IP address on the • Identify the class of an IP address
whiteboard and have the students
identify the class. • Identify if two EtherNet/IP devices are on the same subnet
2. Write two EtherNet/IP address on • Ping an Ethernet IP address
the whiteboard and have the
students determine whether they are As your instructor demonstrates these procedures, follow along in
on the same subnet. the associated job aid(s).
3. Ping an existing IP address of an
EtherNet/IP module and show the
students the “Reply from IP
Address” response.
3. Ping an IP address that has not yet
been assigned and show the
students the “Request timed out”
response.
4. Execute the arp --a command and
show the students the IP and MAC
address pairing list.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
pdiib300
3--12 Pinging a Module’s EtherNet/IP Address

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
pdiib300
Exercise: Pinging a Module’s EtherNet/IP Address 3--13

Exercise: Pinging a Module’s


EtherNet/IP Address

Exercise A In this exercise, you will practice the following tasks:


• Identify the class of an IP address
• Identify if two EtherNet/IP devices are on the same subnet
Context:

As the corporate system designer, you want to know in the event of a


router failure if two devices on the production line are able to
communicate directly with each other or if the router is required to
maintain communications.

For help performing steps in this exercise, see the associated job
aid(s).

Directions:

For the following source and destination devices:


• Indentify the class of an IP address
• Indicate if the EtherNet/IP addresses are a private or public IP
address.
• Determine whether or not the devices are able to communicate
directly with each other or if a router is required.
1. Source: 172.23.252.117
Destination: 172.23.236.18
Subnet mask: 255.255.224.0

2. Source: 10.23.249.18
Destination: 10.23.247.20
Subnet mask: 255.255.248.0

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
pdie300
3--14 Exercise: Pinging a Module’s EtherNet/IP Address

3. If the company will use a Class B private address for its


production line, which of the above source addresses should be
used?

How Did You Do? Turn to the Answers section.

Exercise B In this exercise, you will practice pinging an IP address.

Context:

An EtherNet/IP module’s IP address, subnet mask, and gateway


address serve as a unique identifier for the module on an EtherNet/IP
network. As the project designer for a smelting plant, you are
responsible for configuring all of the EtherNet/IP modules assigned
to the new receiving line in order to readily identify those modules
the shipping and receiving department will employ, monitor, and
service in support of the plant’s smelting operations. The plant
manager cannot locate the list of available IP addresses. You must
determine which IP addresses are available for use.

For help performing steps in this exercise, see the associated job
aid(s).

Directions:

1. Review the following IP address assignments for the following


EtherNet/IP components in your workstation:

Device IP Address Subnet Mask Gateway Address


1756-ENBT 192.168.1.2 255.255.0.0 192.168.1.1
1794-AENT 192.168.1.3 255.255.0.0 192.168.1.1
1756-EWEB 192.168.1.5 255.255.0.0 192.168.1.1

2. Ping the IP addresses of two of these workstation EtherNet/IP


components. What are the system responses you received?

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
pdie300
Exercise: Pinging a Module’s EtherNet/IP Address 3--15

3. Locate the each component’s MAC address and record them in


the following table (you may have to physically remove several
of the modules to locate their MAC address):

Component IP Address MAC Address


1756-ENBT 172.16.1.2
1756-AENT 172.16.1.3
1756-EWEB 172.16.1.5

4. At the command prompt (C:\>), type arp -a and press


ENTER.
5. Use the paired listing of Ethernet IP and MAC addresses
generated by the arp --a command to verify the MAC addresses.

How Did You Do? Turn to the Answers section.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
pdie300
3--16 Exercise: Pinging a Module’s EtherNet/IP Address

Answers Exercise A

1. The devices are using Class B private addresses. The devices


can communicate directly with each other.
2. The devices are using Class A private addresses. A router is
required to establish communications between the devices.
3. The Ethernet IP address 172.23.252.117 is a class B private
address that meets the company’s addressing requirement.

Exercise B

2. The expected system response is: Reply from IP address plus


others system status information.
4. The expected response should have a display similar to the
following graphic:

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
pdie300
Lesson 4
Configuring and Modifying
EtherNet/IP Addresses Using
BOOTP--DHCP Server Software

What You Will Learn After completing this lesson, you should be able to configure and
modify addresses and masks using BOOTP-DHCP Server software.

Why These Skills Are Important

Using a BOOTP software tool allows you to simultaneously modify


the IP addresses of multiple devices on an EtherNet/IP network. This
capability can be a great asset when establishing the initial network
configuration of EtherNet/IP modules during a line start up.

Before You Begin BOOTP-DHCP Server Software

Explain that BOOTP address BOOTP (Bootstrap Protocol): A protocol that automatically
assignments are static unless changed configures the IP addresses of devices on a network without user
by a user.
involvement when an operating system is powered (”booted”) up.
Tell the students that there are a variety
of commercial BOOTP software BOOTP Server: A server that can be used to assign an available IP
packages available that allow a user to
to interface with the BOOTP table to address to a device on an EtherNet/IP network each time the device
create the MAC-IP address is powered up based on the device’s hardware address.
assignments; however, BOOTP-DHCP
Server software is now included with the
purchase of RSLogix software BOOTP--DHCP (Bootstrap Protocol-Dynamic Host
packages. Configuration Protocol) Server Software: A software application
Inform the students that most Rockwell used to assign IP addresses using a BOOTP server.
Automation EtherNet/IP devices are
factory-configured to receive IP Relation List: A list configured using BOOTP-DHCP Server
addresses from a BOOTP server.
(1756-EWEB modules are factory software that matches hardware addresses to unique IP addresses that
configured for DHCP operation). will be assigned to devices by a BOOTP server upon device power
Explain to the students that they do not up:
directly enter information into the • Entering the corresponding MAC and IP addresses associated
BOOTP table, but rather they enter it
into a software interface (e.g., with each EtherNet/IP device into the BOOTP table (via a
BOOTP-DHCP Server software). relation list) allows the BOOTP server to simultaneously assign
The ability to assign IP addresses to IP addresses to multiple modules.
multiple devices at once is extremely
beneficial during a line start up. Address assignments do not take effect unless the
device is configured for BOOTP operation and a
power-cycle occurs on the device.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
btpib300
4--2 Configuring and Modifying EtherNet/IP Addresses Using BOOTP--DHCP Server Software

State that from this pane, it is possible to Relation List Pane: A display in BOOTP-DHCP Server software of
add, delete, and edit address relations, hardware addresses and the IP address matched to them.
as well as enable/disable BOOTP or
DHCP on a module.
Request History Pane: A dynamic display of all incoming requests
Inform the students that if no IP address for an IP address that the BOOTP server has received. If an IP
is assigned to the request, then only the
time the request is received, the request address is assigned to the request, then the pane displays:
type and the MAC address of the sender • Time the request was received (most recent request first)
appear in this pane.
• Request type (BOOTP or DHCP)
• MAC address of the sender
• IP address assigned and host name assigned (if any)
The following graphic is an example of the BOOTP-DHCP Server
software main window:

Request
History
Pane Request Type

Relation Relation
List List Pane

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
btpib300
Configuring and Modifying EtherNet/IP Addresses Using BOOTP--DHCP Server Software 4--3

Tell the students that the Domain Name, The following graphic is an example of a module configuration
and Primary/Secondary DNS fields are screen that is displayed when using BOOTP-DHCP Server software
optional when configuring a module’s IP
address. However, this information is to configure or modify an EtherNet/IP module’s addresses or subnet
required if an EtherNet/IP Web Server mask:
module is configured to send email.

Network and Host


Part Identification
Address of the Gateway (or Router) Capable of
Routing Messages to Remote Networks

Relationship between a
Device’s MAC Address
and its IP Address

Tip " BOOTP-DHCP Server software does allow duplicate IP address


? When might you want to have assignments to be made from the same relations list.
two modules with the same IP
address?
Answer: When one device will be
replacing the other device on the
network; however, only one device will
be actively communicating on the
network.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
btpib300
4--4 Configuring and Modifying EtherNet/IP Addresses Using BOOTP--DHCP Server Software

DHCP can dynamically reconfigure DHCP (Dynamic Host Configuration Protocol): A protocol that
networks in which there are more allows network administrators to centrally manage and automate the
computers than there are available
addresses (e.g., a university). assignment of IP addresses within a network:
DHCP guarantees a user access to the • IP addresses are distributed automatically from a central point as
network but not necessarily the same soon as a network connection is established.
access point each time.
• A different or “dynamic” IP address is assigned each time a
Inform the students that many network connection is established.
administrators lease the IP address
assignments for predefined periods of • DHCP protocol works in conjunction with a DHCP server.
time (e.g., 10 days) so a new IP address • DHCP is an effective tool in an office environment where
may not be assigned each and every
time a module undergoes a power cycle. computer systems require access to a network but do not
necessarily require access to the same device each time a device
Strongly emphasize that DHCP should accesses the network.
not be used on the plant floor.
DHCP is not recommended for a plant floor
environment due to the risk involved when an IP
address changes.

Here’s How To configure and modify addresses and masks using BOOTP-DHCP
1. Open the command prompt window. Server software.
2. Ping the IP address of the
EtherNet/IP module you want to As your instructor demonstrates these procedures, follow along in
configure (the system should time the associated job aid(s).
out).
3. If not already done, configure the
module for BOOTP operation.
4. Open BOOTP-DHCP Server
software.
5. Configure the IP address of an
EtherNet/IP module in your
workstation.
6. Click Enable BOOTP.
7. Cycle power to the module.
8. Ping the module’s IP address to
verify your configuration.
9. If you are not teaching either of the
“web” lessons, demonstrate how a
web browser can be used to access
the module’s TCP/IP Configuration
data.
10. If you will not be teaching either of
the “web” lessons, briefly
demonstrate how a web browser can
be used to access the module’s
TCP/IP Configuration data.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
btpib300
Exercise: Configuring and Modifying EtherNet/IP Addresses Using BOOTP-DHCP Server Software 4--5

Exercise: Configuring and


Modifying EtherNet/IP Addresses
Using BOOTP-DHCP Server
Software

Exercise A In this exercise, you will practice configuring and modifying


addresses and masks using BOOTP-DHCP Server software.

Context:

An EtherNet/IP module’s IP address, subnet mask, and gateway


address serve as a unique identifier for the module on an EtherNet/IP
network. As the project designer for a smelting plant, you are
responsible for configuring all of the EtherNet/IP modules assigned
to the new receiving line in order to readily identify those modules
the shipping and receiving department will employ, monitor, and
service in support of the plant’s smelting operations. After working
closely with your IT department in identifying the number of
modules the operation will require — there are two local modules
and two remote modules — they have provided you with a list of
available IP addresses that you will use to configure your
EtherNet/IP modules.

Since the modules will be introduced to the production line on the


same day, you decide to use a BOOTP/DHCP Server software to
configure the EtherNet/IP modules.

For help performing steps in this exercise, see the associated job
aid(s).

Directions:

1. Review the following IP address assignments for the following


EtherNet/IP components in your workstation:

Device IP Address Subnet Mask Gateway Address


1756-ENBT 192.168.1.2 255.255.0.0 192.168.1.1
1794-AENT 192.168.1.3 255.255.0.0 192.168.1.1
1756-EWEB 192.168.1.5 255.255.0.0 192.168.1.1

2. Open the BOOTP-DHCP Server software.


3. In the Network Settings dialog box, configure the parameters
accordingly.

Tip " This dialog box may open up automatically when you start to create
the Relation List.
Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
btpe300
4--6 Exercise: Configuring and Modifying EtherNet/IP Addresses Using BOOTP-DHCP Server Software

4. Create a relations list using the MAC addresses obtained in the


previous lesson and make the following (new) IP address
assignments:

Component IP Address MAC Address


1756-ENBT 192.168.1.7
1756-AENT 192.168.1.8
1756-EWEB 192.168.1.9

5. Save the relation list as My_MAC_Assignments.bpc.


6. Enable each of the addresses contained in this relation list.
7. Cycle power to the modules. What is occurring in the Relations
List?

8. Ping the new IP addresses of two EtherNet/IP modules in the


table above. What are the system responses you received?

9. How could you verify that the address associated with an


EtherNet/IP module is correct?

10. Verify that the IP addresses assignments made in Step 4. are


correct.
11. Close the the BOOTP-DHCP Server software.

How Did You Do? Turn to the Answers section.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
btpe300
Exercise: Configuring and Modifying EtherNet/IP Addresses Using BOOTP-DHCP Server Software 4--7

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
btpe300
4--8 Exercise: Configuring and Modifying EtherNet/IP Addresses Using BOOTP-DHCP Server Software

Answers Exercise A

7. Each module’s MAC address and new IP address is listed in the


rolling display contained in the Request History pane of the
wizard.
8. The expected system response is: Reply from IP address plus
others system status information.
9. The current IP address for a module can be observed in the:
- EtherNet/IP module’s scrolling display
- RSWho window in RSLinx software if the EtherNet/IP
module was configured for an Ethernet devices
communication driver or an Ethernet/IP driver
- RSLogix 5000 I/O Configuration window, if the module
was configured in a project
- Request History window of the BOOTP-DHCP ServerE
software
- Module’s TCP/IP Configuration information that can be
displayed using a web browser

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
btpe300
Lesson 5
Configuring and Modifying
EtherNet/IP Addresses Using
RSLinx Software

What You Will Learn After completing this lesson, you should be able to configure and
modify addresses and masks using RSLinx software.

Why These Skills Are Important

RSLinx software allows you to modify the network configuration of


any component on an EtherNet/IP network without accessing the
project.

Before You Begin RSLinx Software

Tell the students that an Ethernet From within the RSLinx RSWho window, a module’s configuration
module’s configuration dialog box can be dialog box can be opened for configuring or modifying an
opened by right-clicking the module in
the left pane and selecting “Module EtherNet/IP module’s addresses or subnet mask:
Configuration.”

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
lnxib300
5--2 Configuring and Modifying EtherNet/IP Addresses Using RSLinx Software

Tell the students that the Domain Name, The Port Configuration tab within the module configuration dialog
and Primary/Secondary DNS fields are box is used to configure or modify the Ethernet module’s IP
optional when configuring a module’s IP
address. However, this information is addresses and subnet mask:
required if an EtherNet/IP Web Server
module is configured to send email.

Address of the Device You


Are Configuring or Modifying
Network and Host Part
Identification

Address of the Gateway


(or Router) Capable of
Routing Messages to
Remote Networks

Tip " The Auto-negotiate port speed and duplex feature automatically
select the most optimal way to communicate without the user having
to configure the device.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
lnxib300
Configuring and Modifying EtherNet/IP Addresses Using RSLinx Software 5--3

Here’s How To configure and modify addresses and masks using RSLinx
1. Open RSLinx software. software.
2. Configure the IP address, subnet
mask, and gateway address of an As your instructor demonstrates these procedures, follow along in
EtherNet/IP module in your the associated job aid(s).
workstation.
3. Ping the module’s IP address to
verify your configuration.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
lnxib300
5--4 Configuring and Modifying EtherNet/IP Addresses Using RSLinx Software

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
lnxib300
Exercise: Configuring and Modifying EtherNet/IP Addresses Using RSLinx Software 5--5

Exercise: Configuring and


Modifying EtherNet/IP Addresses
Using RSLinx Software

Exercise A In this exercise, you will practice configuring and modifying


EtherNet/IP addresses and masks using RSLinx software.

Context:

As the project designer on a milling operation, you are responsible


for configuring all of the EtherNet/IP modules assigned to the
production line in order to readily identify those modules your
department will employ, monitor, and service in support of the
production line. After working closely with your IT department in
identifying the number of modules the operation will require — there
are two local modules and two remote modules — they have
provided you with a list of available IP addresses, a subnet mask, and
the gateway address you will use to configure your EtherNet/IP
modules.

The company has recently migrated to using ControlLogix systems


to control the production lines. Not having received training in the
new technology, you decide to use RSLinx software, which you are
familiar with, to configure the EtherNet/IP modules.

For help performing steps in this exercise, see the associated job
aids(s).

Directions:

1. Review the following IP address assignments for the EtherNet/IP


components in your workstation:

Device IP Address Subnet Mask Gateway Address


Workstation computer 192.168.1.11 255.255.0.0 192.168.1.1
1756-ENBT 192.168.1.7 255.255.0.0 192.168.1.1
1794-AENT 192.168.1.8 255.255.0.0 192.168.1.1
1756-EWEB 192.168.1.9 255.255.0.0 192.168.1.1
1769--L32E 192.168.1.6 255.255.0.0 192.168.1.1

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
lnxe300
5--6 Exercise: Configuring and Modifying EtherNet/IP Addresses Using RSLinx Software

2. Ping the IP addresses of two of the workstation’s EtherNet/IP


components. What are the system responses you received?

3. Open RSLinx software.


4. Access one of the two pre-configured drivers (Primary_IP or
Secondary_IP).
5. For each of the components listed in the following table,
configure their IP addresses accordingly:

Alternate New IP
Component Current IP Address New IP address
Address
1756-ENBT 192.168.1.7 192.168.1.2
1794-AENT 192.168.1.8 192.168.1.3
1756-EWEB 192.168.1.9 192.168.1.5
1769--L32E 192.168.1.6 192.168.1.10

6. Ping the IP addresses of the same two EtherNet/IP components


you pinged in Step 2. What are the system responses you
received?

7. What happened with the modules associated with the former IP


addresses in the RSWho window?

8. Ping the new IP addresses of these two EtherNet/IP modules.


What is the system response you received?

9. Configure/modify the subnet mask of the 1756-EWEB module to


be 255.255.255.0 (or alternate subnet mask ________________).
10. Ping the new IP address of the 1756-ENBT module. What is the
system response you received?

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
lnxe300
Exercise: Configuring and Modifying EtherNet/IP Addresses Using RSLinx Software 5--7

11. Configure/modify the gateway address of the 1756-EWEB


module to be 192.168.1.2 (or alternate gateway address
________________).
12. Ping the IP address of the 1756-EWEB module. What is the
system response you received?

13. Explain why the responses obtained in Steps 10. and 12. are the
same.

14. Modify the IP addresses, subnet masks, and gateway addresses of


the 1756-EWEB module as follows:
IP Address: 192.168.1.5
Subnet Mask: 255.255.0.0
Gateway Address: 192.168.1.1
15. How could you verify that the address associated with an
EtherNet/IP module is correct?

16. Verify that the IP addresses assignments made in Step 5. are


correct.

How Did You Do? Turn to the Answers section.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
lnxe300
5--8 Exercise: Configuring and Modifying EtherNet/IP Addresses Using RSLinx Software

Answers Exercise A

2. The expected system response is: Reply from IP address plus


others system status information.
6. The expected system response is: Request timed out or
Destination host unreachable
7. Red X’s are displayed over the devices. RSWho places a red X
over the device to indicate that it cannot be recognized.
8. The expected system response is: Reply from IP address plus
others system status information.
10. The expected system response is Reply from IP address plus
others system status information.
12. The expected system response is Reply from IP address plus
others system status information.
13. Subnet masks place devices on different networks within a
larger network. As long as the subnet is part of the larger
network, devices within the same network should be able to
communicate with each other. If a gateway address entered is
not a valid gateway address, it will not be recognized by a
switch and therefore it will not be able to establish
communications through that gateway.
15. The current IP address for a module can be observed in the
following places:
- EtherNet/IP module’s scrolling display
- RSWho window in RSLinx software if the EtherNet/IP
module was configured for an Ethernet devices
communication driver or an Ethernet/IP driver
- RSLogix 5000 I/O Configuration window, if the module
was configured in a project
- Request History window of the BOOTP-DHCP Server
software
- Module’s TCP/IP configuration information that can be
displayed using a web browser

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
lnxe300
Lesson 6
Configuring and Modifying
EtherNet/IP Addresses Using
RSLogix 5000 Software

What You Will Learn After completing this lesson, you should be able to configure and
modify EtherNet/IP addresses using RSLogix 5000 software.

Why These Skills Are Important

RSLogix 5000 software allows you to modify the network


configuration of any component in an RSLogix 5000 project’s I/O
configuration on an EtherNet/IP network without modifying the
project’s ladder logic.

Before You Begin Configuring and Modifying Ethernet IP Addresses and Masks

A benefit of using RSLogix 5000 software to configure and modify


addresses and subnet masks is the flexibility in interchanging failed
modules without reconfiguring the project’s ladder logic or its I/O
configuration.

Point out that only the module’s IP Offline, a module’s IP address can be configured or modified using
address can be changed offline. the General tab of the Module Properties dialog box:

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
lgxib300
6--2 Configuring and Modifying EtherNet/IP Addresses Using RSLogix 5000 Software

If you are offline with a project, you cannot


configure or modify a module’s subnet mask or
gateway address.

Tell the students that the Port Before you can configure or modify a module’s EtherNet/IP address
Configuration tab in the Module in the Port Configuration tab, you must be online with the controller:
Properties dialog box is inactive when
the controller is offline.

Identifies Network
and Host Parts of
an IP Address

Capable of Routing
Messages to
Remote Networks

Must be Cleared
Before IP
Address Fields
Become Active

Sets IP Address
in the Hardware

Once you download and go online after an IP address change, the


new IP address will be displayed in the General tab, but the old IP
Tell the students that the IP address in address will be displayed in the Port Configuration tab. The new IP
the General and Port Configuration tabs address will not take effect until it is configured and set in the Port
must match or a yellow attention triangle
will be displayed over the module in the Configuration tab.
I/O Configuration.
Tip " The IP address that you assigned in the Port Configuration tab
should be identical to the IP address you assigned in the General tab.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
lgxib300
Configuring and Modifying EtherNet/IP Addresses Using RSLogix 5000 Software 6--3

Explain that once OK is clicked, the When changing a module’s IP address, subnet mask, or gateway
project is taken offline. address online using the Port Configuration tab, the following
prompt box is displayed once Set has been clicked:

Modifying an EtherNet/IP module’s IP address,


subnet mask, or gateway address while online
with a project may interrupt control of an
operation and affect the operation of other
controllers sharing the module.

Tell the students that when going back Once you have applied the changes to the module configuration, the
online after changes have been made in project is taken offline and the following prompt box is displayed:
the Port Configuration tab, the project
file does not have to be downloaded
again. However, the Who Active window
must be used to go back online.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
lgxib300
6--4 Configuring and Modifying EtherNet/IP Addresses Using RSLogix 5000 Software

Here’s How To configure and modify EtherNet/IP addresses using RSLogix 5000
1. Open the LGX_CCP174_A1.acd software.
project.
2. Configure the IP address offline. As your instructor demonstrates these procedures, follow along in
the associated job aid(s).
3. Download the project and go online.
4. Open the Module Properties dialog
box and point out the new IP
address in the General tab.
5. Access the Port Configuration tab
and point out the old IP address.
6. Change the IP address, subnet
mask, and gateway address and
then set the addresses.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
lgxib300
Exercise: Configuring and Modifying Ethernet IP Addresses Using RSLogix 5000 Software 6--5

Exercise: Configuring and


Modifying Ethernet IP Addresses
Using RSLogix 5000 Software

Exercise A In this exercise, you will practice configuring and modifying


EtherNet/IP addresses using RSLogix 5000 software.

Context:

As the project designer on a milling operation, you are responsible


for configuring all of the EtherNet/IP modules assigned to the
production line in order to readily identify those modules your
department will employ, monitor, and service in support of the
production line. After working closely with your IT department in
identifying the number of modules the operation will require — there
are two local modules and two remote modules — they have
provided you with a list of available IP addresses, a subnet mask, and
the gateway address you will use to configure your EtherNet/IP
modules.

The company has recently migrated all projects and production lines
ControlLogixr systems to control the production lines. Having
received training in the new technology, you decide to use RSLogix
5000 software to configure the EtherNet/IP modules.

For help performing steps in this exercise, see the associated job
aid(s).

Directions:

To have any modifications to a module’s IP


address, subnet mask, or gateway address take
effect, you must use the Set option in the module’s
properties dialog box rather than selecting the OK
option.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
lgxe300
6--6 Exercise: Configuring and Modifying Ethernet IP Addresses Using RSLogix 5000 Software

1. Review the following IP address assignments for the EtherNet/IP


components in your workstation:

Device IP Address Subnet Mask Gateway Address


Workstation computer 192.168.1.11 255.255.0.0 192.168.1.1
1756-ENBT 192.168.1.2 255.255.0.0 192.168.1.1
1794-AENT 192.168.1.3 255.255.0.0 192.168.1.1
PanelView Plus 600 192.168.1.4 255.255.0.0 192.168.1.1
1756-EWEB 192.168.1.5 255.255.0.0 192.168.1.1
1769--L32E 192.168.1.10 255.255.0.0 192.168.1.1

2. Open the LGX_CCP174_A1.acd project.


3. What is the IP address assigned to the 1756-ENBT module in this
project?

4. Configure/modify the IP address of the 1756-ENBT module in


this project to be 192.168.1.7 (or alternate IP address
________________).
5. Access the Port Configuration tab and record the corresponding
addresses and subnet mask in the following table:

Module Identifier Address/Mask


IP Address
Subnet Mask
Gateway Address

6. Save the project as my_LGX_CCP174_A1.acd.


7. Download this project to the 1756-L63 ControlLogix controller
and place the controller in the Remote Run mode.
8. What is the IP address of the EtherNet/IP module you will use to
download this project?

9. Access the Port Configuration tab and and then record the
corresponding address and subnet mask in the following table:

Module Identifier Address/Mask


IP Address
Subnet Mask
Gateway Address

10. Configure/modify the IP address of the 1756-ENBT module to be


192.168.1.7 (or alternate IP address ________________).

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
lgxe300
Exercise: Configuring and Modifying Ethernet IP Addresses Using RSLogix 5000 Software 6--7

11. Click Set.


12. What happened to the project after you set the new IP address?

13. Click OK until each of the open dialog boxes closes.


14. Ping the new IP address of the 1756-ENBT module. What is the
system response you received?

15. Go online to the 1756-L63 controller with the new IP address


using the Who Active window.
16. Configure/modify the subnet mask of the 1756-ENBT module to
be 255.255.255.0 (or alternate subnet mask ________________).
17. Click Set.
18. Click OK until each of the open dialog boxes closes.
19. Ping the IP address of the 1756-ENBT module. What is the
system response you received?

20. Go online to the 1756-L63 controller using the Who Active


window.
21. Configure/modify the gateway addresses of the 1756-ENBT
module to be 192.168.2.0 (or alternate gateway address
________________).
22. Click Set.
23. Click OK until each of the open dialog boxes closes.
24. Ping the IP address of the 1756-ENBT module. What is the
system response you received?

25. Offline, modify the IP address of the 1756-ENBT module to


192.168.1.2.
26. Download the project to the 1756-L63 controller and go online.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
lgxe300
6--8 Exercise: Configuring and Modifying Ethernet IP Addresses Using RSLogix 5000 Software

27. Modify the IP addresses, subnet masks, and gateway addresses of


the 1756-ENBT module as follows:
IP Address: 192.168.1.2 (or alternate IP address
________________).
Subnet Mask: 255.255.0.0 (or alternate subnet mask
________________).
Gateway Address: 192.168.1.1 (or alternate gateway address
________________).
28. Click Set.
29. Click OK until each of the open dialog boxes closes.
30. Go online to the 1756-L63 controller using the Who Active
window.
31. How could you verify that the address associated with an
EtherNet/IP module is correct?

32. Verify that the IP addresses assigned to the 1756-ENBT module


are correct.
33. Modify the IP address of the 1769-L32E controller to be
192.168.1.6 (or alternate IP address ________________).
34. Click Set.
35. Click OK until each of the open dialog boxes closes.
36. Ping the new IP address of the 1769-L32E module. What is the
system response you received?

37. Go back online with the 1756-L63 controller using the Who
Active window.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
lgxe300
Exercise: Configuring and Modifying Ethernet IP Addresses Using RSLogix 5000 Software 6--9

38. Observe that the 1769-L32E controller in the I/O Configuration


tree has a warning indicator associated with it. Why did this
happen and how can it be remedied?

How Did You Do? Turn to the Answers section.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
lgxe300
6--10 Exercise: Configuring and Modifying Ethernet IP Addresses Using RSLogix 5000 Software

Answers Exercise A

3. Unless an alternate address was assigned to the module, the IP


address assigned to the project’s ENBT module is 192.168.1.2.
5. Since the project is offline, the following port configuration is
displayed (regardless of the predefined IP address):
Module Identifier Address/Mask
IP Address 0.0.0.0
Subnet Mask 0.0.0.0
Gateway Address 0.0.0.0

8. You need to use the old IP address 192.168.1.2. (The module


has not yet accepted the new IP address of 192.168.1.7).
9. Unless an alternate subnet mask and/or addresses were assigned
to the module, the following port configuration is displayed:
Module Identifier Address/Mask
IP Address 192.168.1.2
Subnet Mask 255.255.0.0
Gateway Address 192.168.1.1

12. Warning dialog boxes open and indicate that communications to


the module were lost. The project is then placed in an offline
operating state.
14. The expected system response is: Reply from IP address plus
others system status information.
19. The expected system response is: Reply from IP address plus
others system status information.
24. The expected system response is: Reply from IP address plus
others system status information.
31. The current IP address for a module can be observed in the:
- EtherNet/IP module’s scrolling display
- RSWho window in the RSLinx software if the EtherNet/IP
module was configured for an Ethernet devices
communication driver or an Ethernet/IP Driver
- RSLogixt 5000 I/O Configuration window, if the module
was configured in a project
- Request History window of the BOOTP-DHCP ServerE
software
- Module’s TCP/IP Configuration information that can be
displayed using a web browser
36. The expected system response is: Reply from IP address plus
others system status information.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
lgxe300
Exercise: Configuring and Modifying Ethernet IP Addresses Using RSLogix 5000 Software 6--11

38. The project is configured for an 1769-L32E controller with an


IP address of 192.168.1.10. Modifying the IP address of a
component does not modify the address within a project’s I/O
configuration. To eliminate these warning icons, modify the
addresses and subnet masks in the project’s I/O configuration
offline before downloading the project.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
lgxe300
6--12 Exercise: Configuring and Modifying Ethernet IP Addresses Using RSLogix 5000 Software

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
lgxe300
Lesson 7
Configuring the 9300-8EDM
Ethernet Diagnostic Module

What You Will Learn After completing this lesson, you should be able to:
• Configure the network interface
• Authorize MAC addresses
• Configure IGMP snooping
• Configure alarm diagnostics
• Configure port mirroring

Why These Skills Are Important

Knowing how to properly configure the 9300-8EDM Ethernet


diagnostic module is important for viewing and controlling an
EtherNet/IP network, restricting traffic overload, and protecting
against unauthorized device access.

Before You Begin 9300-8EDM Diagnostic Module Overview

The 9300-8EDM module is a configurable, managed switch with


diagnostic capabilities. It allows a control system to make real-time
decisions based on network performance and/or changes.

Briefly point out the eight ports. The module has eight 10/100 BaseT Ethernet ports and can only be
used with the Logix platform:

Port 8 Port 7

Port 6 Port 5

Port 4 Port 3

Port 2 Port 1

Explain that the web browser can be The 9300-EDM diagnostic module is configured through a web
accessed by typing the module’s IP browser. The EDS file and user manual are built into the module and
address in the Address bar and pressing
Enter. are accessible through the web browser.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
cedib300
7--2 Configuring the 9300-8EDM Ethernet Diagnostic Module

Network Interface

Mention that the module comes with The 9300-8EDM Ethernet diagnostic module has a factory preset IP
Bootp client enabled by default. address of 192.168.1.1. This IP address along with the subnet mask,
Point out that the Network Configuration and gateway address can be changed using the Network
window is accessed from the Basic Configuration window:
Configuration folder in the module’s web
browser.

Must Be Clicked or
Changes Will Not
Take Effect

Power to the 9300-8EDM Ethernet diagnostic


module must be cycled after the IP address,
subnet mask, and gateway address have been
changed. If power is not cycled, the module will
not load the new information.

Explain that once the module is Power to the module can be remotely recycled through the web
restarted, the web browser will close. browser. When power is recycled, all communications through the
module will be interrupted:

Only Restarts the


9300-8EDM Ethernet
Diagnostic Module

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
cedib300
Configuring the 9300-8EDM Ethernet Diagnostic Module 7--3

MAC Addresses

Mention that the MAC ID Management The 9300-8EDM Ethernet diagnostic module can manage Ethernet
window can be accessed from the devices that connect to the network. This feature allows stricter
Switch Configuration folder.
control of the network without the use of special Ethernet
management software.

Point out the Learned MAC Addresses The MAC ID Management window is used to configure two lists:
and Authorized MAC Addresses lists.
• Learned MAC Addresses List: The module automatically builds
a table of the port numbers and MAC addresses for each device
detected on the network.
• Authorized MAC Addresses List: The user creates a table of the
MAC addresses allowed on the network.
MAC Addresses Can Be Added
or Removed From This List

Explain that when an unauthorized Input bits 1-8 of DWord 0 in the controller or processor correspond
device connects to the network, an input to the eight ports in the module. These bits indicate when an
is sent to the controller or processor.
unauthorized device connects to the network. Input bit 0 indicates
unauthorized device connection for any of the eight ports.

Tell the students that when a port is shut Output bits 1-8 of DWord 0 in the controller or processor also
down, a person will not be able to gain correspond to the eight ports in the module. These bits are used to
access to the network.
shut down the ports. Bit 0 shuts down all ports and disables all
communications.

Tip " For a complete listing of the data layout for the 9300-8EDM
Ethernet diagnostic module, see Appendix B.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
cedib300
7--4 Configuring the 9300-8EDM Ethernet Diagnostic Module

IGMP Snooping

The 9300-8EDM Ethernet diagnostic module can isolate multicast


traffic to only devices that need to receive it through the use of
IGMP snooping. When input and output modules are running on the
network, this feature should be used to make the network more
efficient and deterministic.

Explain that the IGMP protocol prevents Without IGMP snooping, multicast traffic is forwarded to all ports
a multicast packet from behaving like a just like broadcast traffic. This slows down the performance of
broadcast.
devices due to the continuous flow of multicast packets.

Multicasting is a means of transmitting data to a select group of


devices vs transmitting data to the entire network (broadcast) or a
single device (unicast):

Multicast Broadcast Unicast

With IGMP snooping, multicast traffic of a group is only forwarded


to ports that have members of that group. IGMP snooping will
significantly reduce traffic on an EtherNet/IP network and reduce the
burden on devices that are not intended to receive the multicast data.

Mention that the IGMP Configuration The IGMP Configuration window is used to enable the IGMP
window can be accessed from the snooping feature:
Network Services Setup folder.

Determines How Often the Network is


Queried for Group Information

Alarm Diagnostics

The 9300-8EDM Ethernet diagnostic module can be used to monitor


bandwidth on each port. When traffic on the network is running as it
should in production, the module can capture it and use it as a
reference point against current traffic levels.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
cedib300
Configuring the 9300-8EDM Ethernet Diagnostic Module 7--5

Mention that a green bar graph next to The Alarm Setup window is used to calculate the difference between
each port indicates that traffic is within the reference point and current traffic levels:
levels. A red bar graph indicates traffic
has exceeded allowed levels.

Used to Provide a
More Visual
Representation of
Traffic on Each Port Used to Capture
Traffic to be Used as
the Reference Point
Used to Calculate the
Difference Between the
Referenced Traffic Point
and Current Rate of Traffic

Port Mirroring

Tell the students that port mirroring is Port mirroring is a method of monitoring network traffic that
also known as a roving analysis port. forwards a copy of each incoming and outgoing packet from one port
of a network switch to another port where the packet can be studied.
Port mirroring is used as a troubleshooting tool to keep close track of
switch performance.

Port mirroring is configured by assigning a port from which to copy


all packets and another port where those packets will be sent. A
packet bound for or heading away from the first port will be
forwarded onto the second port as well.

Mention that Wireshark is the network A network protocol analyzer is used on the port receiving the
protocol analyzer that will be used in the mirrored data to monitor each segment separately. The analyzer
exercises. Wireshark can be
downloaded from the following website: captures and evaluates the data without affecting the client on the
http://www.wireshark.org. original port.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
cedib300
7--6 Configuring the 9300-8EDM Ethernet Diagnostic Module

Mention that the Mirror Configuration The Mirror Configuration window is used to enable port mirroring
window can be accessed from the and to set filter parameters for incoming and outgoing traffic:
Switch Configuration folder.

Explain that port parameters can be The Port Configuration window is used to manually configure how
manually changed when Negotiation has each port will function:
been set to “None.”

When Auto-Negotiation is
Used, All Parameters
Except Port Mirror Are
Automatically Configured

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
cedib300
Configuring the 9300-8EDM Ethernet Diagnostic Module 7--7

Here’s How To perform the following tasks:


1. Open the CED_CCP174_A1.ACD • Configure the network interface
project file, download, and go online.
• Authorize MAC addresses
2. Open the 9300-8EDM module’s web
browser and show the students how
to change the IP address and subnet
mask.
3. Enable MAC ID Management and
show the students what happens to
ports 1, 2, 3, 5, 7, and 8 on the
PanelView Plus 600 terminal.
4. On the PanelView terminal, enable
ports 4 and 6 and point out what
happens in the Port View screen.
5. Disable Port 8 and in the Command
Prompt, type ping --t 192.168.1.3
and point out the system response.
6. Enable Port 8 and explain how a
user can turn on and shut off a port
using the PanelView terminal.

Here’s How To perform the following tasks:


1. On the PanelView terminal, show • Configure IGMP snooping
students the port bandwidth screen
and point out the traffic on ports 5 • Configure alarm diagnostics
and 7.
• Configure port mirroring
2. In the 9300-8EDM module’s web
browser, enable IGMP snooping.
3. Shut down and exit RSLinx software.
4. In the web browser, change the
scaling factor to 200, enable the
bandwidth alarm, and change the
allowed traffic difference to 400.
5. Wait until traffic decreases very low
on ports 5 and 7 and then capture
the data.
6. Disable IGMP snooping and explain
why ports 3, 5, and 7 go into alarm.
7. Open Wireshark and capture traffic
from all of the ports.
8. Enable mirroring and configure port
2 for both incoming and outgoing
traffic.
9. Configure port 5 for capturing traffic.
10. Using Wireshark, capture traffic and
point out the traffic captured
between the PanelView terminal and
the CompactLogix controller using
port 5.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
cedib300
7--8 Configuring the 9300-8EDM Ethernet Diagnostic Module

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
cedib300
Exercise: Configuring the 9300-8EDM Ethernet Diagnostic Module 7--9

Exercise: Configuring the


9300-8EDM Ethernet Diagnostic
Module

Exercise A In this exercise, you will practice the following tasks:


• Configure the network interface
• Authorize MAC IDs
Context:

As the company’s system designer, you have been asked to install a


new managed switch with diagnostic features. You will need to
configure the switch so that only devices with authorized MAC
addresses can connect to the network.

For help performing steps in this exercise, see the associated job
aid(s).

Apply Changes must be clicked after any


information has been configured or modified in
the 9300-8EDM Ethernet diagnostic module’s
web interface or changes will not take effect.

Directions:

1. Open the CED_CCP174_A1.ACD project file.


2. Download the project file to the 1769-L32E CompactLogixt
controller and go online.
3. Configure the module’s network interface using the following
data:
• Web Browser’s Address Bar: 192.168.1.1.
• User Name: Leave blank
• Password: rockwell
Tip " The password is case sensitive.

• IP Address: 192.168.1.12
• Subnet Mask: 255.255.0.0

4. View the I/O Configuration in RSLogix 5000 software.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
cede300
7--10 Exercise: Configuring the 9300-8EDM Ethernet Diagnostic Module

5. What do you see and why did this occur?

6. Configure the module’s network interface using the following


data:
• IP Address: 192.168.1.1
• Subnet Mask: 255.255.255.0
7. Enable MAC ID management.
8. On the PanelView Plus 600 terminal, press the 9300-8EDM
PORT VIEW button.
9. What do ports 1, 2, 3, 5, 7, and 8 indicate on the PanelView Plus
600 terminal?

10. What do ports 4 and 6 indicate on the PanelView Plus 600


terminal?

11. Authorize all of the MAC addresses.


12. What do ports 1, 2, 3, 5, 7, and 8 indicate on the PanelView Plus
600 terminal?

13. Remove all MAC addresses from the Authorized MAC Addresses
list.
14. On the the PanelView Plus 600 terminal, press the GO TO
MAIN button.
15. Log into the 9300-8EDM PORT CONTROL screen by
performing the following tasks:
A. Press the LOGIN button.
The Login dialog box opens.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
cede300
Exercise: Configuring the 9300-8EDM Ethernet Diagnostic Module 7--11

B. Press the User (F2) button.

C. Enter eng and then press .


D. Press the Password (F3) button.

E. Enter eng and then press .

Tip " User and password are case sensitive.

F. Press
The LOGOUT button is displayed.
G. Press the 9300-8EDM PORT CONTROL button.
16. On the PanelView Plus 600 terminal, press the ENABLE PORT 4
and ENABLE PORT 6 buttons.
17. Press the GO TO MAIN button.
18. Press the 9300-8EDM PORT VIEW button.
19. What happens to ports 4 and 6 and what does this indicate?

20. Press the GO TO MAIN button.


21. Press the 9300-8EDM PORT CONTROL button.
22. Press the DISABLE PORT 4 and DISABLE PORT 6 buttons.
23. Press the DISABLE PORT 8 button.
24. Open the Command Prompt and type ping --t 192.168.1.3.
25. In the Command Prompt, what happens and what does this
indicate?

26. Press the ENABLE PORT 8 button.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
cede300
7--12 Exercise: Configuring the 9300-8EDM Ethernet Diagnostic Module

27. In the Command Prompt, what happens and what does this
indicate?

28. Close the Command Prompt.


29. Click the GO TO MAIN button.
30. Click the LOGOUT button.
31. In the 9300-8EDM Ethernet diagnostic module’s web browser,
disable MAC ID Management.

How Did You Do? Turn to the Answers section.

Exercise B In this exercise, you will practice the following tasks:


• Configure IGMP snooping
• Configure alarm diagnostics
Context:

A new managed switch has been added to your plant’s network. You
notice that some of the devices on the network are performing
poorly. You believe that the devices’ performance may be slowed
down due to the continuous flow of multicast packets caused by the
I/O running on the network. You decide to configure the switch to
limit the multicast packets received by those devices.

The company has asked that traffic be monitored on the network.


You decide to configure alarms to detect when port bandwidth goes
outside its alloted rate.

For help performing steps in this exercise, see the associated job
aid(s).

Directions:

1. On the PanelView Plus 600 terminal, press the 9300-8EDM


BANDWIDTH button.
2. View the bandwidth usage for all of the ports. Pay particular
attention to ports 5 (computer) and 7 (1756-EWEB module).
3. With the 9300-8EDM Ethernet diagnostic module’s web browser
still open, enable IGMP snooping and change the IGMP query
period to 1.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
cede300
Exercise: Configuring the 9300-8EDM Ethernet Diagnostic Module 7--13

4. Exit and shut down RSLinx software.


5. Configure alarm diagnostics with the following information:
• Scaling Factor: 200
• Bandwidth Alarm : Enabled
• Allowed Traffic Difference: 400
6. Wait until traffic decreases very low for ports 5 (computer) and 7
(1756-EWEB module) and then click Save Reference Traffic.

Tip " It may take 30 to 60 seconds for the traffic to decrease.

7. Disable IGMP snooping and wait a few seconds.


8. On the PanelView Plus 600 terminal, what happens to ports 5 and
7?

9. In the web browser, access the Alarm Setup screen.


10. Under the Scaling Factor text box, click Refresh.
11. What happens to ports 3, 5, and 7 and what does this indicate?

12. Configure alarm diagnostics with the following information:


• Scaling Factor: 100
• Bandwidth Alarm : Disabled
• Allowed Traffic Difference: 100

How Did You Do? Turn to the Answers section.

Exercise C In this exercise, you will practice configuring port mirroring.

Context:

The newly installed managed switch has been in operation for


several days. Several devices on the network are not performing as
well as they should be. You decide to monitor network traffic by
using the diagnostic features on the new switch along with an
Ethernet sniffer to help isolate the problem.

For help performing steps in this exercise, see the associated job
aid(s).

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
cede300
7--14 Exercise: Configuring the 9300-8EDM Ethernet Diagnostic Module

Directions:

1. Open the Wireshark network protocol analyzer.


2. Capture network traffic data using the Ethernet sniffer by
performing the following tasks:
A. From the Capture menu, select Interfaces...
The Wireshark: Capture Interfaces dialog box opens.
B. For the Broadcom NetXtreme Gigabit Ethernet Driver, click
Start.
Network traffic is displayed.
C. Wait a few seconds and then click Stop.
Wireshark captures network traffic.
D. Maximize Wireshark software and view all the captured data.
3. In the 9300-8EDM Ethernet diagnostic module’s web browser,
enable mirroring.
4. Configure the following ports for mirroring:
• Port Mirror for Port 2: Both
• Port Mirror for Port 5: Capt

5. Capture network traffic using the Ethernet sniffer by performing


the following tasks:
A. From the Capture menu, select Interfaces...
The Wireshark: Capture Interfaces dialog box opens.
B. For the Broadcom NetXtreme Gigabit Ethernet Driver, click
Start.
A Wireshark prompt box opens asking if you want to save
the capture file before starting a new capture.
C. Click Continue without Saving.
Network traffic is displayed.
D. Wait a few seconds and then click Stop.
Wireshark captures network traffic.
E. Maximize Wireshark software and view all the captured data.
F. What data has been captured?

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
cede300
Exercise: Configuring the 9300-8EDM Ethernet Diagnostic Module 7--15

6. Close the Wireshark network protocol analyzer.


7. In the 9300-8EDM Ethernet diagnostic module’s web interface,
disable mirroring.
8. Change the Port Mirror for Ports 2 and 5 back to None.
9. Close the 9300-8EDM Ethernet diagnostic module’s web
browser.

How Did You Do? Turn to the Answers section.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
cede300
7--16 Exercise: Configuring the 9300-8EDM Ethernet Diagnostic Module

Answers Exercise A

5. A yellow attention triangle is displayed on the 9300-8EDM


Ethernet diagnostic module. This happened because the
module’s new IP address (192.168.1.12) does not match that in
the project (192.168.1.1).
9. Ports 1, 2, 3, 5, 7, and 8 indicate that unauthorized devices have
connected to the network.
10. Ports 4 and 6 are disabled.
12. Ports 1, 2, 3, 5, 7, and 8 indicate that all devices have been
authorized to connect to the network.
19. Ports 4 and 6 turn yellow indicating that the ports are enabled
but no devices have connected to those ports.
25. The Request timed out response is displayed. This indicates that
Port 8 has been shut off.
27. The Reply from response is displayed. This indicates that Port 8
has been turned back on.

Exercise B

3. The IGMP Configuration window should look similar to the


following graphic:

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
cede300
Exercise: Configuring the 9300-8EDM Ethernet Diagnostic Module 7--17

5. The Alarm Setup window should look similar to the following


graphic:

8. Traffic on ports 5 and 7 dramatically increases.


11. Ports 3, 5, and 7 have gone into alarm. This indicates that traffic
on these ports have increased above their allotted bandwidth.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
cede300
7--18 Exercise: Configuring the 9300-8EDM Ethernet Diagnostic Module

Exercise C

3. The Mirror Configuration window should look similar to the


following graphic:

4. The Port Configuration window should look similar to the


following graphic:

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
cede300
Exercise: Configuring the 9300-8EDM Ethernet Diagnostic Module 7--19

5.
F. Communications traffic between the PanelView Plus 600
terminal (IP address 192.168.1.4) and the CompactLogix
(IP address 192.168.1.6) has been captured by using port 5
(computer):

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
cede300
7--20 Exercise: Configuring the 9300-8EDM Ethernet Diagnostic Module

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
cede300
Lesson 8
Establishing EtherNet/IP
Connections to Remote Devices

What You Will Learn After completing this lesson, you should be able to configure an
RSLogixt 5000 project’s I/O configuration to establish remote
communications on an EtherNet/IP network by performing the
following tasks:
• Configure an EtherNet/IP module in a local chassis
• Configure an EtherNet/IP module in a remote chassis
• Configure a digital I/O module in a chassis
• Configure an analog I/O module in a chassis

Why These Skills Are Important

These skills provide you with flexibility on the plant floor by


allowing you to communicate and control remotely located
Logix5000t controllers and I/O modules on the plant floor.

Before You Begin Key Terms

Connection: A communications mechanism that transfers data


between two modules within a system, for example, between a
controller and an I/O module.

Path: A description of the communications route between two


devices, such as a computer and a controller or the source and
destination in a message. Paths can be graphical (e.g., RSWho
window) or numeric (typed using slot and node numbers).

I/O Configuration

The I/O configuration in an RSLogix 5000 project serves as the


backbone of network communications used by a project. The I/O
Configuration folder, located within the Controller Organizer, serves
as a graphical depiction of how a controller communicates with the
local and remote devices associated with the project (i.e., its
communications path).

In the I/O configuration you can observe the “bridging” function of


an EtherNet/IP module or other communications module. The local
and remote chassis both require the same type of communications
module in order to successfully complete the communications
bridge.
Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
remib300
8--2 Establishing EtherNet/IP Connections to Remote Devices

Faults within a hierarchy have a Child Module: A module that is below another module in a
downstream effect; only modules below Logix5000 network hierarchy.
the faulted module will fault. The fault
does not travel up the hierarchy.
Parent Module: A module that is above another module in a
Logix5000 network hierarchy. If the parent module faults, each child
module will also fault.

State that a network hierarchy can also Parent-Child Relationship: A hierarchical communications format
be used when configuring other in which an I/O module or device configured in a remote chassis
communication links (e.g., ControlNet).
communicates with a Logix5000 controller through a connecting
Example: EtherNet/IP to EtherNet/IP; bridge module.
ControlNet to ControlNet
Emphasize that the hierarchy is based The Parent-Child relationship is demonstrated in the following
on the module’s position within a
communications path and not how it is graphic:
displayed (e.g., The Digital_Output
module in slot 4 is not the parent
module of the LabEWEBModule in slot
6).
Point out how a child module can also
serve as a parent module (e.g.,
Remote_ENBT_Bridge2)

? What is the difference between the


two communication paths in these
graphic examples?
Parent Module

Answer: The first example shows a


multi-hop communications path between
the main controller and three remote
controllers. The Child Modules
second example shows
“simultaneous” communications Parent Module
between the main controller and four Child Module
remote chassis - each having an
EtherNet/IP module in
slot 9.

Parent Module

Child Modules

There are three points to consider when configuring a module within


a project’s I/O configuration:
1. If a module needs be modified, you are limited in the
modifications you can make within the I/O configuration. Some
modifications can be made without affecting the I/O
configuration (e.g., slot number) while others impact the I/O
configuration (e.g., redesignating a module).

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
remib300
Establishing EtherNet/IP Connections to Remote Devices 8--3

Example: Redesignating a Module


If you need to redesignate a module in a project’s I/O
configuration (e.g., 1756-ENET to 1756-ENBT):
A. Delete all of its child modules from the I/O Configuration
folder.
B. Delete the module from the I/O Configuration folder.
C. Add the new module to the I/O Configuration folder.
2. The selection of the Electronic Keying option predetermines the
type of module that can be used as a replacement module within a
chassis (should the need arise).
Inform the students that the 3. The Communications Format option, only available on some
Communications Format option is modules, plays a significant role in connection management.
dependent upon its placement in the
hierarchy as well as the module itself.
Alert the students to the fact that the Electronic Keying Options
Communications Format is an option Electronic keying is a feature of Logix5000 adapter and I/O modules
that cannot be modified once the module
is added to the I/O Configuration folder that provides an electronic check to ensure that the software
without first deleting the module (and all configuration of the module matches the detected module in the slot
of its child modules). to a user-specified level.
Electronic keying checks the following parameters:
• Vendor
• Product type
• Catalog number
• Major revision
• Minor revision

Electronic Keying Options

Exact Match: Requires all attributes of the physical module and the
module created in the software to match in order to establish a
connection to the module. If all of the attributes do not match,
communication with the inserted module is not established.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
remib300
8--4 Establishing EtherNet/IP Connections to Remote Devices

Compatible Module: Allows the physical module to accept the key


of the module configured in the software, provided the configured
module is one the physical module is capable of emulating. The
exact level of emulation required is product--specific.

Modules that have identical catalog The Compatible Module electronic keying option specifies that the
numbers and major revisions, varying module will communicate with the inserted module based on
only by minor revisions, cannot always
be guaranteed to allow a connection if firmware compatibility.
Compatible Module electronic keying is
used. The following criteria must be met, or communications with the
inserted module will not occur:
• The Module Type, Catalog Number, and Major Revision must
match.
• The Minor Revision of the physical module must be equal to or
greater than the one specified in the software.
This option should be used sparingly, Disable Keying: Allows for no attributes of the physical module and
(e.g., testing a new network or product the module created in the software to match in order to establish
line) as it may leave a product line
vulnerable to unanticipated events (e.g., communications with the inserted module. The controller does not
major faults). employ electronic keying at all.

Be extremely cautious when using this option; if


used incorrectly, this option can lead to personal
injury or death, property damage or economic loss.

Changing Electronic Keying selections may cause


the connection to the module to be broken and may
result in a loss of data.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
remib300
Establishing EtherNet/IP Connections to Remote Devices 8--5

Communications Format Options

Re-state that the Communication Format When configuring a module within a project’s I/O configuration, one
option is not available for all modules field that you may be required to complete is the Communications
nor is it available at all levels of the
hierarchy. Format field. The options available are module dependent.
Example: The Communications Format An example of typical communication format options are displayed
option is not available for a 1756-ENBT
module in a local chassis but it is for a in the following graphic:
remote chassis.

Communication Format
Options

Although some of these terms may have Rack Optimization: An I/O communications format enabling an
been previously discussed in the EtherNet/IP module to collect digital I/O words into a rack image
Determining System Bandwidth
Requirements and CIP Connections thereby conserving bandwidth and the number of connections used:
lesson, explain the terms again within • Rack-Optimized Connection: A read/write connection enabling
this context or use this opportunity to
review the concepts and test the a communications module (e.g., an EtherNet/IP module) to
students’ understanding. collect digital I/O words into a rack image instead of collecting
from each I/O module separately.
Rack optimized I/O modules are limited in the amount of status
and diagnostic information they can provide to the network:
-- If diagnostic or status information is critical to your project,
consider using the diagnostic I/O modules in another rack.
? Why should you use non-diagnostic -- If a rack is using either of the rack-optimized communication
modules in a rack-optimized format? formats, consider using non-diagnostic I/O modules.
Answer: Cost. Diagnostic modules cost
more than their non-diagnostic • Listen-Only Connection: An I/O connection where another
counterparts and provide functionality controller owns/provides the configuration data for the module:
you cannot employ effectively.
-- Does not write data to the configuration
-- Establishes a connection to the module when the owner
controller is actively controlling
Note that not all rack-optimized modules -- Counts as a single connection but is only able to read/receive
within a rack containing listen-only data
modules need to be configured to
operate in a listen-only mode.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
remib300
8--6 Establishing EtherNet/IP Connections to Remote Devices

Rack Optimization Considerations


RPI (Requested Packet Interval): The maximum amount of time
before data is sent to a Logix5000 module.

When a remote EtherNet/IP module is configured for rack


optimization:
• The child modules will only operate at the RPI specified for the
parent module.
• If your project requires modules to operate at varying time
intervals:
-- Relocate the modules to another rack
or
-- Don’t configure the modules to operate in either of the
rack-optimized communications formats
• When the digital I/O modules in a rack are rack-optimized, the
modules collectively count as one connection rather than as
separate connections:
-- Analog I/O modules cannot be rack-optimized.
-- It is possible to have rack-optimized digital I/O modules
residing in the same rack as other non-rack-optimized
modules.
-- The rack-optimized modules in a rack will count as one
connection while each of the analog I/O modules will count as
a separate connection.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
remib300
Establishing EtherNet/IP Connections to Remote Devices 8--7

Example: Rack-Optimized Communications -- RPI Selection


In this example project, remote communications have been
established between two 1756-ENBT modules. The remote
EtherNet/IP module has been configured for rack-optimized
communications at an RPI of 10 ms.
? Is there a problem with the I/O Observe in the following graphic how the RPI spin boxes of the
modules being used in this example? rack-optimized digital I/O modules are not active but have the
Answer: No; however, it may not be the same value as the 1756-ENBT module, while the RPI spin box is
best way to employ diagnostic I/O active for the analog module (and it has a different value than the
modules in a rack-optimized
configuration. 1756-ENBT module):

Rack-Optimized Remote
1756-ENBT Module

Rack-Optimized Remote
IB16D Module
Rack-Optimized Remote
OB16D Module

Remote IF8 Module

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
remib300
8--8 Establishing EtherNet/IP Connections to Remote Devices

Example: Rack-Optimized Communications -- Direct


Connections
If no rack-optimized option is selected for the following remote
rack of I/O modules, how many direct connections are used in the
following rack?
Answer: 9 and 3 If rack-optimized options are selected for the following remote
rack of I/O modules, how many direct connections are used in the
following rack?

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
remib300
Establishing EtherNet/IP Connections to Remote Devices 8--9

State that these parameters are only a Module Configuration Parameters


small portion of the ones they may
encounter. The parameters available are In addition to the Electronic Keying and Communication Format
dependent upon the modules selected options, you may find it necessary to configure additional parameters
for inclusion in a project’s I/O
configuration. for the modules used within your project. A graphical sampling of
these parameters are displayed below:
If necessary, remind students that
configuring the parameters for
the various I/O modules is not Tip " RSLogix 5000 software provides an online Help system that contains
the focus of the course. additional procedures and information regarding these parameters.

Configurable
Digital I/O Module
Parameters

Configurable
Analog I/O Module
Parameters

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
remib300
8--10 Establishing EtherNet/IP Connections to Remote Devices

Here’s How To perform the following tasks:


1. Open the REM_CCP174_DEM1.acd • Configure an EtherNet/IP module in a local chassis
project.
• Configure an EtherNet/IP module in a remote chassis
2. Configure the ENBT module in the
ControlLogix chassis as a child • Configure a digital I/O module in a chassis
module to the 1769-L32E processor • Configure an analog I/O module in a chassis
using the following parameters:
Name: Local_Parent_ENBT
IP address: 192.168.1.2 As your instructor demonstrates these procedures, follow along in
Communications Format: Rack the associated job aid(s).
Optimization
Slot: 1
Chassis Size: 7
Electronic Keying: Disable Keying
RPI: 25 ms
3. Configure the 1756 digital I/O
modules in slots 4 and 5 as child
modules with Disable Keying. Show
that the RPI value has been
pre-defined for the modules since
the parent module was configured
for rack optimization.
4. Configure the AENT module in the
remote Flex I/O chassis as a child
module to the 1769-L32E controller
using the following parameters:
Name: Remote_AENT
IP address: 192.168.1.3
Communications Format: None
Chassis Size: 1
Electronic Keying: Disable Keying
5. Configure the 1794 analog output
module in slot 0 as a child module.
6 Import the tags file
REM_CCP174_DEM1--Tags.CSV.
7. Save the project as
my_REM_CCP174_DEM1.acd.
8. Access the properties dialog box for
either the Remote_ENBT or
Remote_AENT module and show
the students how some parameters
can be modified while others cannot
be modified (without first deleting the
module and its child modules).
9. Download the project into the
1769-L32E controller and place the
controller in the Remote Run mode.
10. Open and download the
REM_CCP174_DEM1.acd project
into the 1756-L63 controller.
11. Press any of the pushbuttons
associated with the CompactLogix
I/O modules. Note how the
corresponding remote output in the
ControlLogix chassis is activated.
12 Press pushbutton 3/7 and observe
how the analog meter in the remote
Flex I/O chassis moves.
E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
remib300
Exercise: Establishing EtherNet/IP Connections to Remote Devices 8--11

Exercise: Establishing EtherNet/IP


Connections to Remote Devices

This lesson contains two exercise that establish EtherNet/IP


connections to remote devices. The first uses a ControlLogixt
system as the local controller that will communicate with a remote
analog FlextI/O module. The second exercise uses a
CompactLogixt system as the local controller that will
communicate with a remote DeviceNett scanner. It is recommended
that you undertake the exercise that uses the control platform you
regularly encounter at your work facility.

Exercise A In this exercise, you will practice the following tasks:


• Configure an EtherNet/IP module in a local chassis
• Configure an EtherNet/IP module in a remote chassis
• Configure a digital I/O module in a chassis
• Configure an analog I/O module in a chassis
Context:

Your production line has a remotely located analog meter that uses
your plant’s EtherNet/IP network to read locally generated digital
input signals. The value displayed by the analog meter will either
increase or decrease based on the duration of the input signal. In
order for the project’s existing ladder logic to work properly, you
need to configure the EtherNet/IP and I/O modules in the project’s
I/O Configuration in order to establish remote communications
between the I/O devices.

For help performing steps in this exercise, see the associated job
aid(s).

Directions:

1. Open the REM_CCP174_A1.acd project.


2. Configure a 1756-ENBT module in the local chassis:
-- Major Revision: 4
-- Name: Local_Parent_ENBT
-- IP address: 192.168.1.2 (or alternate IP address
________________).
-- Slot: 1
-- Electronic Keying: Disable Keying

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
reme300
8--12 Exercise: Establishing EtherNet/IP Connections to Remote Devices

3. Configure a 1756-IB16D module in the local chassis:


-- Major Revision: 3
-- Name: My_Local_IB16D
-- Slot: 4
-- Communication Format: Full Diagnostics -- Input Data
-- Electronic Keying: Disable Keying
4. Configure a 1756-OB16D module in the local chassis:
-- Major Revision: 3
-- Name: My_Local_OB16D.
-- Slot: 5
-- Communication Format: Full Diagnostics -- Output Data
-- Electronic Keying: Disable Keying
5. Configure a 1794-AENT adapter module for remote
communications (with the 1756-ENBT module as its parent
module):
-- Major Revision: 3
-- Name: Remote_Child_My_Flex_AENT
-- IP address: 192.168.1.3 (or alternate IP address
________________).
-- Communication Format: None
-- Chassis Size: 1
-- Electronic Keying: Disable Keying
6. Configure a 1794-OE4 analog output module for remote
operations with (with the 1794-AENT module as its parent
module):
-- Major Revision: 2
-- Name: My_Flex_Analog_Out
-- Slot: 0
-- Communication Format: Output Data
-- Electronic Keying: Disable Keying
-- Requested Packet Interval (RPI): 25 ms
-- Configure the Output Channel Voltage/Current Range as
follows:

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
reme300
Exercise: Establishing EtherNet/IP Connections to Remote Devices 8--13

7. Now that you have configured your project, you need to assign
aliases to several of the tags used in the ladder logic of this
project:

Tag Name Alias For Alternate Alias For Data Type


In_meter_down Local:4.I.Data.7 BOOL
In_meter_up Local:4.I.Data.3 BOOL
Remote_Child_My_Flex
Out_meter INT
_AENT:0:O.Ch0Data

8. Save the project as my_REM_CCP174_A1.acd.


9. Download this project to the 1756-L63 ControlLogixr controller.
10. Place the controller in Remote Run mode.
11. Verify that there are no yellow triangles present in the project’s
I/O Configuration tree.
12. If any yellow triangles are present in the project’s I/O
Configuration tree, troubleshoot as necessary.
Tip " A common problem is a mismatch between a module’s IP address
and the IP address associated with the module in the I/O
Configuration tree.

13. On the workstation, press and hold the In_meter_up pushbutton.


The needle on the analog output meter should go up.
14. On the workstation, press and hold the In_meter_down
pushbutton.
The needle on the analog output meter should go down.
15. Save and close the my_REM_CCP174_A1.acd project.

How Did You Do? Turn to the Answers section.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
reme300
8--14 Exercise: Establishing EtherNet/IP Connections to Remote Devices

Exercise B In this exercise, you will practice the following tasks:


• Configure an EtherNet/IP module in a local chassis
• Configure an EtherNet/IP module in a remote chassis
• Configure a digital I/O module in a chassis
Context:

Your production line has a remotely located photo-eye that senses


when a filled carton of materials is ready for shipment. You want to
locally monitor the number of cartons that are available for
shipment. In order for the project’s existing ladder logic to work
properly, you need to configure the EtherNet/IP and I/O modules in
the project’s I/O Configuration in order to establish remote
communications between the I/O devices.

For help performing steps in this exercise, see the associated job
aid(s).

Directions:

1. Open the REM_CCP174_B1.acd project.


2. Configure a 1769-L32E module in the local chassis by entering
the IP address 192.168.1.6 (or alternate IP address
________________) for the module.
3. Configure a 1769-IQ16 in the local chassis:
-- Name: My_Local_IQ16.
-- Slot: 1
-- If not already pre-defined as follows, change the following
parameters accordingly:
-- Series: A
Tip " You may have to change and save the electronic keying option
before you can change the module’s series and revision parameters.

-- Revision: 3
-- Electronic Keying: Disable Keying
-- Connection: Input
-- Data Format: Integer

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
reme300
Exercise: Establishing EtherNet/IP Connections to Remote Devices 8--15

4. Configure a 1769-OB16 in the local chassis:


-- Name: My_Local_OB16
-- Slot: 2
-- If not already pre-defined as follows, change the following
parameters accordingly:
-- Series: B
Tip " You may have to change and save the electronic keying option
before you can change the module’s series and revision parameters.

-- Revision: 3
-- Electronic Keying: Disable Keying
-- Connection: Output
-- Data Format: Integer
5. Configure a 1756-ENBT Ethernet bridge module for remote
operations (with the 1769-L32E module as its parent module):
-- Major Revision: 3
-- Name: Remote_Child_ENBT
-- IP address: 192.168.1.2 (or alternate IP address
________________).
-- Communication Format: None
-- Slot: 1
-- Chassis Size: 7
-- Electronic Keying: Disable Keying
6. Configure a 1756-DNB DeviceNett scanner for remote
operations with (with the 1756-ENBT module as its parent
module):
-- Major Revision: 10
-- Name: My_Remote_DNB
-- Slot: 3
-- Input Size: 1
-- Output Size: 1
-- Status Size: 32
-- Electronic Keying: Disable Keying
-- RPI: 10
7. Now that you have configured your project, you need to assign
aliases to several of the tags used in the ladder logic of this
project:

Tag Name Alias For Alternate Alias For Data Type


Remote_Child_ENBT:3:I.
In_photo BOOL
Data[0].0
Remote_Child_ENBT:3:O.
Out_DNB_Run BOOL
CommandRegister.Run
In_any_PB Local:1:I.Data INT
Dout_Lites Local:2:O.Data INl

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
reme300
8--16 Exercise: Establishing EtherNet/IP Connections to Remote Devices

8. Save the project as my_REM_CCP174_B1.acd.


9. Download this project to the 1769-L32E CompactLogixt
controller.
10. Place the controller in Remote Run mode.
11. Verify that there are no yellow triangles present in the project’s
I/O Configuration tree.
12. If any yellow triangles are present in the project’s I/O
Configuration tree, troubleshoot as necessary.
Tip " A common problem is a mismatch between a module’s IP address
and the IP address associated with the module in the I/O
Configuration tree.

13. Verify that the LED display on the DNB indicates RUN mode.
14. Place your hand in front of the photo-eye switch and verify that
all of the LEDs/light illuminate.
15. If all LEDs /lights in the workstation are on, press any button on
the panel to switch off all lights except the one you pressed.
16. Repeat Steps 15. to 14. as necessary.
17. Save and close the my_REM_CCP174_B1.acd project.

How Did You Do? Turn to the Answers section.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
reme300
Exercise: Establishing EtherNet/IP Connections to Remote Devices 8--17

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
reme300
8--18 Exercise: Establishing EtherNet/IP Connections to Remote Devices

Answers Exercise A

2. The configuration of the 1756-ENBT module should look


similar to the following graphic:

3. The configuration of the 1756-IB16D module should look


similar to the following graphic:

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
reme300
Exercise: Establishing EtherNet/IP Connections to Remote Devices 8--19

4. The configuration of the 1756-OB16D module should look


similar to the following graphic:

5. The configuration of the 1794-AENT module should look


similar to the following graphic:

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
reme300
8--20 Exercise: Establishing EtherNet/IP Connections to Remote Devices

6. The configuration of the 1794-OE4 analog module should look


similar to the following graphic:

7. The Edit Tags tab should have a display similar to the following
graphic:

11.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
reme300
Exercise: Establishing EtherNet/IP Connections to Remote Devices 8--21

Exercise B

2. The configuration of the 1769-L32E module should look


similar to the following graphic:

3. The configuration of the 1769-IQ16 module should look similar


to the following graphic:

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
reme300
8--22 Exercise: Establishing EtherNet/IP Connections to Remote Devices

4. The configuration of the 1769-OB16 module should look


similar to the following graphic:

5. The configuration of the 1756-ENBT module should look


similar to the following graphic:

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
reme300
Exercise: Establishing EtherNet/IP Connections to Remote Devices 8--23

6. The configuration of tghe 1756-DNB module should look


similar to the following graphic:

7. The Edit Tags tab should have a display similar to the following
graphic:

11. The I/O Configuration should look similar to the following


graphic:

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
reme300
8--24 Exercise: Establishing EtherNet/IP Connections to Remote Devices

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
reme300
Lesson 9
Producing and Consuming Data
over an EtherNet/IP Network

What You Will Learn After completing this lesson, you should be able to:
• Create a produced tag
• Create a consumed tag

Why These Skills Are Important

Having the skills to correctly produce and consume tags will allow
you to share data between controllers in the same chassis over the
backplane or in different chassis over a control network without
ladder logic. Produced/consumed tags are defined to be sent from
one controller to another at a specified rate -- determined by the
consuming controller. This can be useful when upgrading to a newer
controller or storing larger programs.

Before You Begin Key Terms


If you are teaching the standard course,
you may skip over the definitions that Connection: A communications mechanism that transfers data
were previously presented or you may between two modules within a system, for example, between a
want to review them to reinforce the
students’ understanding of the material. controller and an I/O module.

Consumed Connection: In a Logix5000t system, a network


connection on the end of a controller that is receiving data from
another controller across a ControlBust backplane or over a
network such as EtherNet/IP by means of a consumed tag.

Consumed Tag: In a Logix5000 controller, a tag that receives data


from another controller across the ControlBus backplane or over a
network such as EtherNet/IP.

State that implicit connections use an Implicit Connection: A network connection used to transfer
RPI. real-time I/O data.
? What are some examples of an Produced Connection: In a Logix5000 system, a network
implicit connection? connection on the end of a controller that is sending data to another
Answer: Rack-optimized connections; controller across a ControlBus backplane or over a network such as
direct connections; messages using
produced tags EtherNet/IP by means of a produced tag.

Inform the students that if they are using Produced Tag: In a Logix5000 controller, a tag that is broadcast
RSLogix 5000 software, version 13 or onto the local ControlBus backplane or across an EtherNet/IP
earlier, a produced tag will have a check
mark in the P column of the Tags list. network for use by other controllers.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
pncib300
9--2 Producing and Consuming Data over an EtherNet/IP Network

Producer Controller: A Logix5000 controller that is configured to


produce (transmit) data to one or more consumer controllers over a
ControlBus backplane or a network such as EtherNet/IP.

RPI (Requested Packet Interval): The maximum amount of time


before data is sent to a Logix5000 module.

Producing and Consuming Data

Compare the Produce/Consume model Produce/Consume Model


with the more common
Source/Destination model. Many A communication model based on the content of the data rather than
communication models (protocols) use a the source or destination of the data:
token passing -- peer-to-peer approach
to establish communications between • Devices that need the data (consumers) recognize the data they
two devices on a network: need and consume it (at a specified rate).
S The node holding the token initiates • Data is sent out on the network in a single message, no matter
communications.
how large the number of nodes to which it needs to go.
S Contacted node can respond to but
cannot initiate communications until • All consumer nodes receive and “consume” the information
token is passed to it. simultaneously.
S The node holding the token can only • Receipt of information is synchronized:
hold the token for a finite period of
time: -- Bandwidth is conserved since the information is ”produced”
once to multiple “consumers.”
-Unfinished communications must
wait until the node receives the
token again. To limit the number of connections used, consider
S Multiple node communications are grouping data into an array or a user-defined data
not conducive to the plant floor type and producing only that array or structure.
environment:
-Communication does not occur
simultaneously. Coordination and
synchronization are difficult.
-Bandwidth is wasted since the
same information is conveyed
multiple times.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
pncib300
Producing and Consuming Data over an EtherNet/IP Network 9--3

Network Optimization
Effectively managing and employing produced and consumed tags
can help optimize your EtherNet/IP network’s peformance.

Note that a separate lesson reviews the The total number (and not the size) of produced and consumed
number of connections consumed by connections:
produced and consumed tags.
• Counts against the number of connections a system can support
• Affects bandwidth usage
• Affects maximum input or output times for a system

Produced and Consumed Tag Requirements


Data that meets the following requirements can be shared by
controllers without using ladder logic (i.e., message instructions):
Note that these are the 32-bit data • Tags must be a data type that is 32 bits or larger (e.g., DINT,
types. REAL, TIMER, COUNTER, etc.), an array of these data types, or
a user-defined data type.
Add that 500 bytes equals 125 DINTs or • Data must be less than or equal to 125 DINTs.
250 INTs.
Data that is shared between two or more
controllers using produced and consumed tags
must be connected via the same network (e.g.,
EtherNet/IP to EtherNet/IP).
You cannot bridge produced and consumed tags
over two different networks (e.g., EtherNet/IP to
ControlNett).

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
pncib300
9--4 Producing and Consuming Data over an EtherNet/IP Network

Produced and Consumed Arrays


BOOL, SINT, and INT arrays can be indirectly produced and
consumed by performing the following actions:
• Create a user-defined data type containing a single member:
-- Make the single member an array of the desired type
• Copy this user-defined data type to both controllers
• Produce and consume tags of this data type

Note that consumed tag names do not If a user-defined structure is produced, there must
require naming conventions through the be a structure with the identical size and layout in
software. However, your plant may opt
to use naming conventions to make the consuming controller. To ensure accuracy,
troubleshooting easier. copy the structures between projects.
Emphasize that if structures are the
same size but different layout, data from
the first member in structure A (e.g., a
REAL) will incorrectly transfer to the first Producer Data Consumer
member in the other structure B (e.g., a DINT TIMER
DINT).
DINT BOOL
BOOL DINT
TIMER DINT

Producer Data Consumer


DINT DINT
DINT DINT
BOOL BOOL
TIMER TIMER

In addition, you can consume an array of INTs from a PLC-5rC


controller over a ControlNet network by performing the following
actions:
• Define a user-defined data type with two members:
-- Name the first member Status and assign it a DINT data type
-- Make the second member an array of INTs

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
pncib300
Producing and Consuming Data over an EtherNet/IP Network 9--5

Remind students that this is the tag Creating a Produced Tag


being “sent.”
In the New Tag dialog box, you can create a tag to be produced:

Tag Name - Required


to Configure
Consumed Tag(s)

Produce Option

Maximum Number
of Consumers

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
pncib300
9--6 Producing and Consuming Data over an EtherNet/IP Network

Add that the consumed tag can be Creating a Consumed Tag


created or it can be an existing tag that
is modified. In the New Tag dialog box, you can create a tag to be consumed.
In the graphic, point out that the RPI is
per tag and not controller.
Mention that you must be offline or
online in Program mode to change the
RPI.
Tag Name

Exact Match
Required

Produce Option
Must Be in Consuming
Controller’s I/O
Configuration

RPI for Consumed Tag

A produced tag should be consumed by only one


tag in a consuming controller. Multiple consumed
tags within a controller using the same produced
tag will result in unpredictable controller-to-
controller behavior.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
pncib300
Producing and Consuming Data over an EtherNet/IP Network 9--7

If a consumed tag connection faults, all other tags


being consumed from the producing controller
will also stop receiving data.

The Remote Data (source tag name) must be


Point out that this is not the consumed exactly the same as the produced tag name in the
tag name. producing controller.

Tip " For accuracy, the source project should be opened and the tag names
should be copied.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
pncib300
9--8 Producing and Consuming Data over an EtherNet/IP Network

Here’s How To perform the following tasks:


1. Open the PNC_CCP174_DEM1.acd • Create a produced tag
project.
• Create a consumed tag
2. Create a new (produced) tag with
following parameters: As your instructor demonstrates these procedures, follow along in
Name: Produced_Data_Tag
Tag Type: Produced the associated job aid(s).
consumers: 1
Data Type: DINT[2]
Scope:
PNC_CCP174_DEM1(controller)
Style: Decimal
3. Save the project as
my_PNC_CCP174_DEM1.acd
4. Download the project into the
1769-L32E controller and place the
controller in the Remote Run mode.
5. Open the PNC_CCP174_DEM2.acd
project in another instance of
RSLogix 5000 software.
6. Create a new (produced) tag with
following parameters:
Name: Consumed_Data_Tag
Tag Type: Consumed
Producer:
Compact_Logix_Producer
Remote Tag Name:
Produced_Data_Tag
RPI: 15
Data Type: DINT[2]
Style: Decimal
7. In the PNC_Demo_Routine, insert
the tags Consumed_Data_Tag[0]
and Consumed_Data_Tag[1] as the
source values for the move
instructions contained in rung 0.
8. Save the project as
my_PNC_CCP174_DEM2.acd
9. Download the project into the
1756-L63 controller and place the
controller in the Remote Run mode.
10. From the Monitor Tags tab in the
my_PNC_CCP174_DEM1.acd
project, modify the values of
Produced_Data_Tag[0] and
Produced_Data_Tag[1].
11. In the
my_PNC_CCP174_DEM2.acd
project, point out the new values.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
pncib300
Exercise: Producing and Consuming Data over an EtherNet/IP Network 9--9

Exercise: Producing and


Consuming Data over an
EtherNet/IP Network

Exercise A In this exercise, you will you will practice the following tasks:
• Create a produced tag
• Create a consumed tag
Context:

Your company introduced a new production line that is controlled by


a CompactLogixt controller. This new production line needs to use
two data values that are generated by one of the older production
lines (which is controlled by a ControlLogixr controller). You are
tasked with generating the exchange of data between these two
controllers without adding ladder logic to either of the projects.

For help performing steps in this exercise, see the associated job
aid(s).

Directions:

1. Open RSLogixt 5000 software.


2. Open the PNC_CCP174_A1.acd project.
3. Create a produced tag:
-- Name: Produced_Data_Tag
-- Tag Type: Produced
-- Consumers: 1
-- Data Type: DINT[2]
-- Scope: PNC_CCP174_A1(controller)
-- Style: Decimal
4. Open the Produce_Routine and delete the empty rung of ladder
logic in this project.
5. Save the project as my_PNC_CCP174_A1.acd.

If you fail to save the project under this name,


you will not be able to successfully complete
the exercise as it is written.

6. Download this project to the 1756-L63 ControlLogix controller.


7. Place the controller in Remote Run mode.
8. Minimize this session of RSLogix 5000 software.
Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
pnce300
9--10 Exercise: Producing and Consuming Data over an EtherNet/IP Network

9. Open another instance of RSLogix 5000 software.


10. Open the PNC_CCP174_A2.acd project.
11. Create a consumed tag:
-- Name: Consumed_Data_Tag
-- Tag Type: Consumed
-- Producer: my_PNC_CCP174_A1
-- Remote Tag Name: Produced_Data_Tag
-- RPI: 10
-- Data Type: DINT[2]
-- Style: Decimal
12. Verify that the consumed tag was created.
13. Open the Consume_Routine and delete the empty rung of ladder
logic in this project.
14. Save the project as my_PNC_CCP174_A2.acd.
15. Download this project to the 1769-L32E CompactLogix
controller.
16. Place the controller in Remote Run mode.
17. Verify that there are no yellow triangles present in the project’s
I/O Configuration tree.
18. If any yellow triangles are present in the project’s I/O
Configuration tree, troubleshoot as necessary.
Tip " A common problem is a mismatch between a module’s IP address
and the IP address associated with the module in the I/O
Configuration tree.

19. Access the Monitor Tags tab.


20. Locate the Consumed_Data_Tag and then record the following
tag values:

Tag Name Value


Consumed_Data_Tag[0]
Consumed_Data_Tag[1]

21. Restore the session of RSLogix 5000 software containing the


project my_PNC_CCP174_A1.acd.
22. Access the Monitor Tags tab.
23. Locate the Produced_Data_Tag and then modify the following tag
values:

Tag Name Value


Produced_Data_Tag[0] 12
Produced_Data_Tag[1] 327

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
pnce300
Exercise: Producing and Consuming Data over an EtherNet/IP Network 9--11

24. Once again, locate the Consumed_Data_Tag in the


my_PNC_CCP174_A2.acd project and then record the
following tag values:

Tag Name Value


Consumed_Data_Tag[0]
Consumed_Data_Tag[1]

25. Modify either of the Consumed_Data_Tag values. What happens


to the value of the tag you modified?

26. Save and close the my_PNC_CCP174_A1.acd and


my_PNC_CCP174_A2.acd projects.

How Did You Do? Turn to the Answers section.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
pnce300
9--12 Exercise: Producing and Consuming Data over an EtherNet/IP Network

Answers Exercise A

3.

11.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
pnce300
Exercise: Producing and Consuming Data over an EtherNet/IP Network 9--13

20. Consumed_Data_Tag[0] = 0
Consumed_Data_Tag[1] = 0
24. Consumed_Data_Tag[0] = 12
Consumed_Data_Tag[1] = 327
25. The value of the Consumed_Data_Tag immediately reverts to
the corresponding Produced_Data_Tag value, thus indicating
that the Produced_Data_Tag is being consumed by the
Consumed_Data_Tag.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
pnce300
9--14 Exercise: Producing and Consuming Data over an EtherNet/IP Network

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
pnce300
Lesson 10
Communicating between Multiple
Controllers on an EtherNet/IP
Network Using a Message
Instruction

What You Will Learn After completing this lesson, you should be able to:
• Program an MSG instruction in a ladder logic project
• Configure an MSG instruction

Why These Skills Are Important

Message instructions allow a controller to communicate with other


devices that are not configured in an originating controller’s I/O
configuration via an EtherNet/IP network. Additionally, a message
instruction can be sent to write or read data between two controllers
over an EtherNet/IP network instead of creating produced and
consumed tags to transfer data at a specific RPI.

Before You Begin Key Messaging Concepts


If you are teaching the standard course,
you may skip over the definitions that Cached Connection: A continuously open connection associated
were previously presented or you may with an MSG instruction.
want to review them to reinforce the
students’ understanding of the material.
Explicit Connection: A network connection used to transfer
Explain that explicit connections do not non-critical data such as that used in device configuration or data
use an RPI. collection. Program downloads and messaging between processors or
? What are some examples of an controllers is accomplished via explicit connections. Commonly
referred to as a Class 3 connection.
explicit connection?
Answer: MSG instructions, PanelView Message: A data transfer from a processor or controller to another
terminals, RSView graphic displays processor, controller, or module.
Inform the students that while the
emphasis of this lesson is on A message instruction enables a project to transfer data between two
communications between Logix 5000
controllers, a Logix5000 controller can Logix5000 controllers or from a Logix5000 controller to an I/O
also send a message to communicate module that is not configured in the originating controller’s I/O
with the following processors: configuration via an EtherNet/IP network.
SPLC-5
SSLC 500
SPLC-3
SPLC-2

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
msgib300
10--2 Communicating between Multiple Controllers on an EtherNet/IP Network Using a Message Instruction

Connection Management
Using message instructions to transfer data will either affect or be
affected by the total number of connections available to the
EtherNet/IP module. In managing message connections, you have
two options:
Cached connections should be used • Cache the connection:
when a MSG instruction will execute
repeatedly. -- Connection exists continuously.
Tell the students that they should -- Connection counts as one of your available connections.
attempt to cache the connected -- Bandwidth constraints are impacted.
messages that execute most often or -- Execution time is optimized.
execute frequently.
-- Maximum number of cached connections is 32.
State that each time a connection is
opened when a message executes, it
increases the routine’s execution time.

Explain to the students that by not using • Don’t cache the connection:
caching message instructions, you save
connections and bandwidth -- a major -- Connection exists only when data is transferred.
advantage over using produced and -- Connection only counts as one of your available connections
consumed tags.
when it is used.
-- Connection must be available when called for.
-- Bandwidth constraints are not directly impacted.

Enabling Connections
How message connections are employed will impact their
performance on the EtherNet/IP network.

If you enable more than 16 MSG instructions at one time, some


MSG instructions may experience delays entering the message
queue. To guarantee the execution of each message, employ one or
more of the following message management strategies:
• Enable each message in sequence.
• Enable the messages in groups.
• Program a message to communicate with multiple devices.
• Program your project to coordinate the execution of messages.
If multiple messages are going to the same device, they may be able
to share a connection:

If the messages are being sent to . . . And they are . . . Then . . .


Enabled at the same time Each MSG instruction uses one connection.
The same device The MSG instructions share the connection
Not enabled at the same time
(i.e., together they count as one connection).
Different devices — Each MSG instruction uses one connection.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
msgib300
Communicating between Multiple Controllers on an EtherNet/IP Network Using a Message Instruction 10--3

Configuring a Message

When using a message instruction to send data to or from a


Logix5000 controller, keep in mind the following points:
Tell the students that this will be • A message uses an explicit connection that must be factored into
discussed in greater detail later in the your system design for bandwidth and connection limitations.
lesson.
• Both the source and destination tags must be controller-scoped.
Note that PLC-5 and SLC 500 • The source and destination tags cannot be Axis, Message, or
processors require Integer data. Motion_Group tags.
• Array elements and structure members cannot be specified:
-- Use an alias tag to send these types of data.
• A portion of an array cannot be transferred:
-- Send the entire array using the array name, or send one
element of an array using an alias tag.
Tell the students that they can Exchanging data between two controllers or a controller and an I/O
interchange the order in which the module using a message instruction involves the following three
controller-scoped tag and rung of ladder
logic are created; however, both need to main steps:
be done before they configure
the MSG instruction. Tip " For specific step-by-step instructions, refer to the procedures guide.

? What is a controller-scoped tag? 1. Create a controller-scoped tag of the data type MESSAGE:
Answer: A tag that can be used by all
programs within a Logix5000 controller.
I/O tags are automatically assigned as
controller-scoped tags. Also called
global tags.

Inform the students that the actual steps


used to configure a controller-initiated
email message are detailed in the
procedures guide and will be
demonstrated in the Here’s How section
of this lesson.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
msgib300
10--4 Communicating between Multiple Controllers on an EtherNet/IP Network Using a Message Instruction

Note that the message is continuous as 2. Enter the ladder logic:


long as the “trigger” is true and the
routine is enabled.

3. Configure the message (MSG) instruction:


A. Configure the Configuration tab parameters.
Once a message type is selected, you will be asked to
configure a series of parameters. The following parameters
are common to most message types:

Message Type

Destination Element

Configuration Parameter Tabs


for Various Message Types

Source Element

Number of Elements

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
msgib300
Communicating between Multiple Controllers on an EtherNet/IP Network Using a Message Instruction 10--5

• Source Element: The tag or logical address currently


containing the data to be transferred.
Inform the students that the length • Number of Elements (Source Length): The number of
varies with the data being sent. elements to be transferred. The number of elements you
Example: The number of elements read/write depends on the type of data you are using.
transferred in an email message sent via
a web server module is the length of the • Destination Element (Destination): The tag or logical
message + 4. address to which the data will be transferred.
The following parameter must be defined for CIP Generic messages:
• Service Type: The type of service to be performed on the module
(e.g., resetting latched diagnostics or performing a pulse test).
Depending on the service type selected, some of the following
Hex codes may or may not need to be manually configured:
Inform the students that additional -- Service code: Category of service to be performed.
information regarding these parameters -- Class: The I/O module type.
can be be found in the accompanying
documentation reference guide or the -- Instance: Message type ID.
online Help system. -- Attribute: The attribute to be reset (such as latched status on
an analog module).

Manually Configured
Parameters

System Configured
Parameters

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
msgib300
10--6 Communicating between Multiple Controllers on an EtherNet/IP Network Using a Message Instruction

B. Configure the Communication tab parameters.


When configuring the communication parameters, you will
need to:
-- Identify the communications path of the message.
-- Identify if the connection is to be cached.

Communication Path

Cache Options

Communications Path
Path: A description of the communications route between two
devices, such as a computer and a controller or the source and
destination in a message. Paths can be graphical (selected in the
RSWho window) or numeric (typed using port and node numbers).

Numeric Communications Path: A numeric description of the


route that communications will take between two devices, such as
the source and destination in a message.

Let the students know that this will be When you establish the communications path, you are specifying the
demonstrated by you in the Here’s How exact path the message will traverse as it travels from its originating
section and they will have an opportunity
to practice this skill while completing this source to its final destination.
exercise.
Also let them know that step-by-step
procedures are contained in the
procedures guide.
Additionally, inform the students that
they need to specify a path for each
MSG instruction used -- for which the
path may or may not be the same.
E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
msgib300
Communicating between Multiple Controllers on an EtherNet/IP Network Using a Message Instruction 10--7

The path identifies how the message will travel between devices
(backplane or EtherNet/IP module) and the location (slot) of all
devices through which the message passes through:

If the data will travel through . . . Then the path value used is . . .
The backplane 1
An EtherNet/IP module 2
The device’s slot number or IP
A device
address

Tip " A combination of module name, IP address, and numeric paths can
be used.

Let the students know that the paths in Once the communications path has been mapped and saved, it will
both of the examples are the same be displayed in a format similar to the following examples:
except the second one uses the device’s
name.

Numeric Path Module Name Combination

This communications path translates to:


• Out the processor across the backplane (1)
• To the EtherNet/IP module in slot 9 (9)
• Out the EtherNet/IP module (2)
• Over the EtherNet/IP network to the EtherNet/IP module in the
remote chassis (10.88.244.135)
• Out the EtherNet/IP module across the backplane (1)
• To the processor in slot 3 (3)
Inform the students that Tip " Programmatic configuration of the communications path, node
additional information regarding address, parameters, and source/destination permits one message to
how to target multiple devices can be
found in the accompanying target multiple devices, reducing the number of messages in a
documentation reference guide or the project.
online Help system.
Message Execution
Note that the enhanced message debug While online, message errors can be identified in RSLogixt 5000
tools also provide error codes that
reduce ambiguity in error messages. software:
• A message that is not received will not have the .DN bit set.
• Error codes can be found in the Configuration dialog box:
-- Enhanced message debug tools identify which module
generated the run-time error code.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
msgib300
10--8 Communicating between Multiple Controllers on an EtherNet/IP Network Using a Message Instruction

Monitoring Data Transfers

If you are teaching the standard course, Data transferred via produced and consumed tags can be monitored
mention that data views and web pages from a variety of displays:
will be discussed and demonstrated in
greater detail in the two Web lessons • The Monitor Tags tab
(but note that they will not learn how to
create customized web pages in this • Within a project or routine (i.e., ladder logic editor, function
course). block diagrams, or structured text editor)
• Data views
• Customized web pages

Here’s How To perform the following tasks:


1. Open the MSG_CCP174_DEM1.acd • Program an MSG instruction in a ladder logic project
project and enter the following rung
of ladder logic: XIO • Configure an MSG instruction
Recv_Duplex_Info_MSG.EN XIC
Message_Send0 MSG As your instructor demonstrates these procedures, follow along in
Recv_Duplex_Info_MSG the associated job aid(s).
2. Configure the message instruction:
Message Type: CIP Generic
Service Type: Custom
Service Code: 1, Class: f6
Instance: 1, Attribute: 0
Source Length: 0
Destination: Baud_Duplex_Data
Path: 1,2
3. Enter the following rung of ladder
logic: XIO
Send_Duplex_Info_MSG.EN XIC
Message_Send1 MSG
Send_Duplex_Info_MSG
4. Configure the message instruction:
Message Type: CIP Generic
Service Type: Set Attribute Single
Service Code: 10, Class: f6
Instance: 1, Attribute: 6
Source Element: Baud_Src
Source Length: 4, Path: 1,2
5. Save the project as
my_MSG_CCP174_DEM1.acd,
download and go online with project.
6. Create a Quick Watch view of the
following values:
Baud_Src[0], Baud_Src[1]
Baud_Duplex_Data[0]
Baud_Duplex_Data[4].0
Baud_Duplex_Data[4].1
Message_Send0 (optional)
Message_Send1 (optional)
7. Press/toggle Message_Send0 and
observe the Baud_Duplex_Data
values in the Quick Watch view.
8. Press/toggle Message_Send1 and
observe the Baud_Duplex_Data
values in the Quick Watch view.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
msgib300
Exercise: Communicating between Multiple Controllers on an EtherNet/IP Network 10--9

Exercise: Communicating between


Multiple Controllers on an
EtherNet/IP Network
Using a Message Instruction

Exercise A In this exercise, you will practice the following tasks:


• Program an MSG instruction in a ladder logic project
• Configure an MSG instruction
Context:

During the mid-shift, one of the EtherNet/IP modules failed and


needed to be replaced. The crew working the mid-shift replaced the
module and configured it to use the same IP address as the module it
replaced. Unfortunately they did not record the MAC address of the
replacement module so that it may be added to the BOOTP Relation
List. As the senior project designer, you need to add a message
instruction to an existing project that will provide you with the
module’s MAC address.

For help performing steps in this exercise, see the associated job
aid(s).

Directions:

1. Open the MSG_CCP174_A1.acd project.


2. Create a tag:
-- Name: Production_Count
-- Tag Type: Base
-- Data Type: MESSAGE
-- Scope: MSG_CCP174_A1 (controller)
3. Open the MSG_Routine.
4. Enter the following rung of ladder logic:

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
msge300
10--10 Exercise: Communicating between Multiple Controllers on an EtherNet/IP Network

5. Configure the message instruction:


-- Message Type: CIP Data Table Write
-- Source Element: Count_Write
-- Number of Elements: 1
-- Destination Element: Count_From_CLogix
-- Path: Browse to the 1769-L32E CompactLogix_Controller.
6. Now that you have configured your project, you need to assign
aliases to the tags used in the ladder logic of this project:

Tag Name Alias For Alternate Alias For Data Type


Clear_MSG Local:4:I.Data.1 BOOL
Send_MSG Local:4.I.Data.0 BOOL

7. Save the project as my_MSG_CCP174_A1.acd.


8. Download this project to the 1756-L63 ControlLogixr controller.
9. Place the controller in Remote Run mode.
10. Open the MSG_CCP174_A2.acd project.
11. Create a tag:
-- Name: Count_From_CLogix
-- Tag Type: Base
-- Data Type: DINT
-- Scope: MSG_CCP174_A2 (controller)
-- Style: Decimal
12. Save the project as my_MSG_CCP174_A2.acd.
13. Download this project to the 1769-L32E CompactLogixr
controller.
14. Place the controller in Remote Run mode.
15. In the my_MSG_CCP174_A1.acd project, access the Monitor
Tags tab.
16. In the Value column for the Count_Write tag, type 450 and then
press ENTER.
17. On the workstation, press the Send_MSG pushbutton or toggle
the corresponding bit.
18. In the my_MSG_CCP174_A2.acd project, access the Monitor
Tags tab.
19. View the value of the Count_From_CLogix tag.
20. On the workstation, press the Clear_MSG pushbutton or toggle
the corresponding bit.
21. Press the Send_MSG pushbutton or toggle the corresponding bit.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
msge300
Exercise: Communicating between Multiple Controllers on an EtherNet/IP Network 10--11

22. View the value of the Count_From_CLogix tag.


23. Save and close the my_MSG_CCP174_A1.acd and
my_MSG_CCP174_A2.acd projects.

How Did You Do? Turn to the Answers section.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
msge300
10--12 Exercise: Communicating between Multiple Controllers on an EtherNet/IP Network

Answers Exercise A

2.

5.

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
msge300
Exercise: Communicating between Multiple Controllers on an EtherNet/IP Network 10--13

11.

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
msge300
10--14 Exercise: Communicating between Multiple Controllers on an EtherNet/IP Network

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
msge300
Appendix A
Data Layout for the 9300-8EDM
Ethernet Diagnostics Module

DINT Input (DWord 0) DINT Output (DWord 0)


Bit 0 Shuts Down All Ports
Bit 0 Unauthorized MAC ID on Network
(Disables All Communications)
Bit 1 Unauthorized MAC ID on Port 1 Bit 1 Shuts Down Port 1
Bit 2 Unauthorized MAC ID on Port 2 Bit 2 Shuts Down Port 2
Bit 3 Unauthorized MAC ID on Port 3 Bit 3 Shuts Down Port 3
Bit 4 Unauthorized MAC ID on Port 4 Bit 4 Shuts Down Port 4
Bit 5 Unauthorized MAC ID on Port 5 Bit 5 Shuts Down Port 5
Bit 6 Unauthorized MAC ID on Port 6 Bit 6 Shuts Down Port 6
Bit 7 Unauthorized MAC ID on Port 7 Bit 7 Shuts Down Port 7
Bit 8 Unauthorized MAC ID on Port 8 Bit 8 Shuts Down Port 8
Bit 9 Device Connected to Port 1 (Link Active) Bit 9 Reserved
Bit 10 Device Connected to Port 2 Bit 10 Reserved
Bit 11 Device Connected to Port 3 Bit 11 Reserved
Bit 12 Device Connected to Port 4 Bit 12 Reserved
Bit 13 Device Connected to Port 5 Bit 13 Reserved
Bit 14 Device Connected to Port 6 Bit 14 Reserved
Bit 15 Device Connected to Port 7 Bit 15 Reserved
Bit 16 Device Connected to Port 8 Bit 16 Reserved
Bit 17 Device Connected to Port 1 Bit 17 Reserved
Bit 18 Device Connected to Port 2 Bit 18 Reserved
Bit 19 Device Connected to Port 3 Bit 19 Reserved
Bit 20 Device Connected to Port 4 Bit 20 Reserved
Bit 21 Device Connected to Port 5 Bit 21 Reserved
Bit 22 Device Connected to Port 6 Bit 22 Reserved
Bit 23 Device Connected to Port 7 Bit 23 Reserved
Bit 24 Device Connected to Port 8 Bit 24 Reserved
Bit 25 Port Shut Down from PLC Bit 25 Reserved
Bit 26 IGMP Snooping Enabled Bit 26 Reserved
Bit 27 Reserved Bit 27 Reserved
Bit 28 Reserved Bit 28 Reserved
Bit 29 Reserved Bit 29 Reserved
Bit 30 Reserved Bit 30 Reserved
Bit 31 Reserved Bit 31 Reserved

(Continued)

Rev. November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
DTL_ap
A--2 Data Layout for the 9300-8EDM Ethernet Diagnostics Module

DINT Input (DWord 0) Bit DINT Output (DWord 0)


DWord 1 Multicast Connections Active
DWord 2 TCP Connections Active
DWord 3 Bandwidth Used Port 1 (%)
DWord 4 Bandwidth Used Port 2 (%)
DWord 5 Bandwidth Used Port 3 (%)
DWord 6 Bandwidth Used Port 4 (%)
DWord 7 Bandwidth Used Port 5 (%)
DWord 8 Bandwidth Used Port 6 (%)
DWord 9 Bandwidth Used Port 7 (%)
DWord 10 Bandwidth Used Port 8 (%)
DWord 11 Scaling Factor

E 2006 Rockwell Automation, Inc. All rights reserved. Rev. November 2006
DTL_ap
The following are trademarks of Rockwell Automation, Inc.:
1336 FORCE 1336 IMPACT
1336 PLUS CompactLogix
ControlBus ControlLogix
Data Highway Plus DH+
DriveTools FactoryTalk
Flex FlexLogix
Logix5000 Logix5550
PanelBuilder PanelView
PLC-5 PHOTOSWITCH
PowerFlex RediSTATION
RSLinx RSLogix
RSView RSNetWorx
SCANPort SLC
SoftLogix Ultra

EtherNet/IP and ControlNet are trademarks of ControlNet International Ltd.

DeviceNet is a trademark of the Open DeviceNet Vendor Association, Inc. (ODVA).

The following are registered trademarks of Microsoft Corporation:


MS-DOS PowerPoint
Windows Windows NT

IBM is a registered trademark of International Business Machines Corporation.

Pentium is a registered trademark of Intel Corporation.

All other trademarks are the property of their respective holders and are hereby acknowledged.
Catalog Number ABT-CCP174-TIM -- November 2006 E 2006 Rockwell Automation, Inc. All rights reserved.
Catalog Number ABT-N300-TIM40 -- September 2005 Printed in USA

Das könnte Ihnen auch gefallen